Published on: December 10, 2014

HITRUST is excited to share that the organization has been recognized as an industry influencer in the Reboot 25 edition of SC Magazine. This year’s annual edition offers a special feature of individuals and organizations who’ve paved the way over the years and presented the industry with “innovative technology, thought-provoking security strategies and exemplary leadership.”

SC Magazine takes a look at how, seven years after the founding of HITRUST, the healthcare industry has embraced and widely adopted the the Common Security Framework (CSF). The profile also recognizes HITRUST’s work to establish health care-specific guidance for the NIST Cyber Security Framework. It also recognizes the launch of our cyber security programs. These include the CyberRX threat simulation exercises, coordinated with the Department of Health and Human Services to evaluate the cyber preparedness and response of private and public health care organizations, as well as our cyber threat intelligence sharing activities.

HITRUST is recognized along with some of the most influential leaders in information security in the public and private sectors. This honor is an acknowledgement of so many leaders in the healthcare industry who have offered their commitment and efforts to achieve the vision and mission for HITRUST. (See Reboot 25: The Influencers)

So what can we expect in 2015? SC Magazine also features a Q&A with HITRUST CEO, Daniel Nutkis, who predicts “that the level of organizational maturity varies greatly across the industry and as such we see that a significant threat in 2015 for the healthcare industry is organizations not implementing and following strong information security principles.” He also acknowledges the widening gap between the capabilities of cyber defenders (healthcare organizations) and attackers (threat actors) in the healthcare industry” but also advises that organizations “should not get distracted from the fundamentals of managing risks associated with health and other sensitive information.” (See A Look Ahead: Security Experts Share Forecasts on 2015)

We encourage you to read this extensive edition on Cybersecurity in 2014 and 2015!