Assessment Best Practices
SOC2 and HITRUST: The Best of Both Worlds
Changes to the Assurance Program and What They Mean For You
CLOUD
Automating HITRUST Compliance in The Cloud
Shared Responsibility – Understanding How to Share Control Responsibility in the Cloud
True or False: Is Everything in the Cloud?
Enterprise Blockchain with Security and Compliance
Compliance
Streamlining Your HITRUST Compliance With ServiceNow
Leveraging HITRUST Programs for NIST Assurance
Cross-Industry Adoption
HITRUST CSF Beyond Just Healthcare
Cybersecurity
HITRUST CSF = A Kaizen Standard for Cyber Defense
General Sessions
Third Party Assurance – A Legal Perspective
Key Privacy and Security Developments at the State, National and Global Levels
Forging a Stronger Approach to Sector Sharing
HITRUST + FAIR: A Marriage of Measurement
Healthcare
The Modern Healthcare Value Chain is a Care-centric Supply Chain
Practical Cybersecurity for Medical Devices
Pre-Conference Workshops
How to Effectively Conduct a Risk Assessment
Implementation of the NIST Cybersecurity Framework with the HITRUST Approach
Privacy
De-identification: Its Value to Businesses and How to Do It Right
Risk Management
Making Cents ($) of Maturity: Building Resistive Strength
You’re HITRUST Certified! Now What?