Simplify and strengthen your compliance strategy with HITRUST on Steroids Using MyCSF. Join experts from Baker Tilly, Milliman, and HITRUST to explore how the MyCSF tool streamlines compliance across frameworks like HITRUST, SOC 2, ISO 27001, and more. Learn how to align multiple audit needs, win over business leaders with scalable solutions, and confidently respond to risk reviews. Plus, hear Milliman’s success story in managing hundreds of partner risk assessments with ease. Don’t miss this opportunity to transform your approach—register now.
If you liked this webinar, you may also be interested in:
Feb 3, 2025
The Digital Operational Resilience Act (DORA), passed by the European Union, marks a significant shift in how businesses manage and mitigate digital risks. Aimed primarily at financial institutions and critical service providers, DORA is designed to ensure that these entities remain operationally resilient despite digital disruptions, cyberattacks, and system failures.
What organizations are subject to DORA?
DORA impacts a wide range of entities, including
- Banks and financial institutions
- Payment processors and providers
- Insurance firms
- Information and Communications Technology (ICT) third-party service providers
- Investment firms
These organizations must adhere to DORA to safeguard the EU’s financial system from the cascading effects of digital disruptions.
What does DORA require for compliance?
DORA compliance revolves around several core pillars.
- Risk Management: Organizations must implement comprehensive risk management frameworks that cover all aspects of their digital operations, from data integrity to security of systems.
- Incident Reporting: Institutions must establish a protocol for reporting significant digital incidents, ensuring that appropriate authorities are notified within specific timeframes.
- Testing: Regular testing of ICT systems is mandatory to ensure resilience against potential vulnerabilities.
- Operational Resilience Plans: Businesses need well-documented and executable plans to continue operations in the event of significant disruptions.
- Vendor Risk Management: One of the most stringent aspects of DORA is the focus on third-party vendor risk. Financial institutions must scrutinize their ICT third-party providers to ensure compliance with resilience standards. Vendor relationships need to be assessed, monitored, and managed to avoid introducing vulnerabilities into the organization.
The stringency of vendor risk management
DORA’s provisions for vendor risk management are particularly rigorous. Businesses must not only vet their vendors carefully but also have continuous oversight of their performance and compliance. Third-party providers must meet specific resilience standards, and contracts with these vendors must reflect the organization’s commitment to minimizing digital risk exposure. This heightened focus on third-party risk places significant responsibility on businesses to extend their operational resilience beyond their internal systems.
DORA roll-out: A phased approach to compliance
The roll-out of the EU’s DORA regulation is scheduled through January 2025. Key dates for businesses include
- January 2023: DORA was formally adopted by the EU, marking the beginning of the awareness and preparation phase.
- January 2025: This is the deadline by which businesses must be fully DORA compliant. By this date, financial institutions and relevant ICT service providers will be expected to implement the necessary frameworks and systems for digital operational resilience, including risk management, incident reporting, and vendor oversight.
- Ongoing: Post-2025, supervisory authorities will start stringent enforcement, conducting audits and assessments to ensure continuous DORA compliance. Businesses will be required to regularly test their ICT systems, report significant incidents, and manage vendor risk proactively.
Organizations should update internal processes and make sure that they align with DORA’s standards to avoid penalties and ensure operational resilience.
HITRUST: Supporting DORA compliance
In this iteration of the HITRUST CSF, businesses will have the ability to assess and manage their DORA compliance efficiently. HITRUST, with its comprehensive risk management framework, will enable organizations to align with DORA’s requirements, particularly in areas like vendor risk management and operational resilience. As DORA continues to set the benchmark for operational resilience across the EU, HITRUST will ensure that businesses are equipped to meet these expectations, simplifying the certification process and maintaining the highest standards of security, privacy, and supply chain risk.
Understanding the EU’s DORA Regulation: What It Means for Businesses Understanding the EU’s DORA Regulation: What It Means for Businesses
Jan 29, 2025
As AI continues to gain momentum, organizations face new risks, challenges, and security concerns. In response, HITRUST launched two comprehensive AI assurance solutions in 2024.
1. HITRUST AI Risk Management Assessment
2. HITRUST AI Security Assessment and Certification
Let’s explore.
Common features
Before diving into each solution’s unique attributes, it’s important to note that both AI Risk Management and AI Security Assessments share several foundational HITRUST capabilities.
-
Prescriptive, harmonized controls
Each AI assessment leverages HITRUST’s rigorous, prescriptive controls built on a harmonized framework that reflects leading standards such as ISO/IEC 23894:2023, NIST RMF, and more.
-
Cyber threat-adaptive framework
HITRUST regularly updates control sets to address evolving AI threats. This continuous refinement ensures that both AI assessments stay current with emerging risks.
-
Powered by MyCSF
Both solutions use HITRUST’s SaaS platform, MyCSF, enabling organizations to efficiently manage assessments and securely share results and reports with stakeholders.
-
Credibility and reliability
HITRUST has an established track record in cybersecurity assurance, providing globally recognized methodologies that organizations of all sizes can trust.
HITRUST AI Risk Management Assessment
Purpose
The HITRUST AI Risk Management Assessment is designed for organizations seeking a targeted evaluation of their AI risk management practices.
Key features
- Non-certified solution: Evaluates AI risk management without the formalities of a certification process
- 51 AI-specific controls: Focuses on AI risks based on 51 controls, helping you pinpoint vulnerabilities and prioritize improvements
- Self-evaluation: Allows flexibility to perform a standalone self-assessment or engage a HITRUST External Assessor for independent testing
- Cost-effective entry point: Offers a cost-effective way to begin identifying and addressing AI-related risks
- AI RM Insights Report: Delivers clear, detailed scoring mapped to ISO/IEC 23894:2023 and NIST RMF v1.0, including color-coded scorecards, gap analysis, and next-step recommendations
Ideal for
- AI users and producers looking for a flexible approach to assess AI risks
- Organizations wanting a low-barrier, targeted way to identify AI gaps
- Teams looking to create or refine an AI risk management program but not yet ready to pursue formal certification
HITRUST AI Security Assessment and Certification
Purpose
The HITRUST AI Security Assessment and Certification is a higher-level assurance solution that validates the security of AI systems in a formal manner.
Key features
- Certified validation: Results in a HITRUST AI certification that demonstrates the highest level of security assurance to stakeholders
- 44 security controls: Focuses on the security and privacy of AI platforms with 44 controls, which can be tailored based on specific use case scenarios
- Independent, centralized quality review: Includes third-party validation and centralized quality review, demonstrating rigorous testing and reliable results
- Inheritance: Allows to inherit AI controls from cloud service providers and other vendors that already have HITRUST-certified systems
- Seamless add-on to HITRUST cybersecurity assessments: Can be added to any of HITRUST’s core assessments (e1, i1, r2), ensuring comprehensive coverage of both cybersecurity and AI security in a unified approach
Ideal for
- AI developers and deployers seeking a formal certification that can be shared with customers, regulators, and partners
- Organizations looking to align AI security controls with recognized frameworks (e.g., NIST, ISO/IEC, OWASP) and consolidate compliance efforts
- Teams that proactively want to stay ahead of new AI security threats
Which one is right for you?
If you’re exploring AI risks, processes, and gaps, choose the HITRUST AI Risk Management Assessment to gain deep insights without the pressure of achieving certification. This approach offers an entry point to identify AI risks and build a roadmap for improvement cost-effectively.
If you need formal recognition, choose the HITRUST AI Security Assessment and Certification to showcase a validated, independently reviewed AI security posture. This ensures your stakeholders have the assurance they need regarding your organization’s AI security readiness.
Bottom line
HITRUST’s AI assurance addresses the evolving landscape of AI risk, compliance, and security. You will benefit from HITRUST’s proven framework, advanced tools, and industry-leading approach whether you opt for the AI Risk Management Assessment or the AI Security Assessment.
HITRUST’s flexible solutions help ensure AI technologies are deployed responsibly, securely, and with optimal risk management no matter your organization’s size or AI maturity. Choose the solution that best aligns with your goals — risk-focused or security-focused — to confidently navigate the complexities of AI adoption while meeting stakeholder expectations for transparency and assurance.
Visit the HITRUST AI Hub for more information on how HITRUST can help you secure, manage, and certify your organization’s AI systems.
HITRUST AI Risk Management and AI Security Certification: What’s the Difference? HITRUST AI Risk Management and AI Security Certification: What’s the Difference?
Jan 14, 2025
The digital transformation of healthcare has unlocked incredible opportunities to improve patient care and operational efficiency. However, it has also exposed a critical flaw in how third-party risk management (TPRM) is done across the industry.
As digital health technologies proliferate, so do the challenges for security teams tasked with vetting vendors. The traditional questionnaire-based vendor assessment model was long considered the gold standard for due diligence, but it is struggling to keep pace with the volume and complexity of today’s supply chains.
The chokepoint in the procurement process
Healthcare organizations rely on a vast ecosystem of vendors to power everything from telemedicine platforms to electronic health records. But with great reliance comes great responsibility: these vendors must be thoroughly vetted to ensure they won’t introduce vulnerabilities into the organization.
The sheer volume of vendors is overwhelming security teams. Requests for security due diligence assessments are coming in faster than they can be completed, creating a backlog that frustrates internal business owners waiting to onboard critical technologies.
This bottleneck not only slows innovation but also prevents teams from reassessing critical vendors as their technology evolves and threats change.
The vendor's perspective: A broken model
The challenges aren’t limited to healthcare providers. Vendors in the supply chain are equally overwhelmed by the inefficiencies of the current system. Every prospective customer requires some form of security due diligence, and there’s no industry-wide standardization.
Vendors often face
- Inconsistent questionnaires: Each customer has unique expectations, making it impossible to standardize responses.
- Moving goalposts: Security requirements vary widely across healthcare entities, leading to confusion and delays.
- Resource constraints: Vendors with finite security teams struggle to keep up with the growing volume of audits, leaving customers dissatisfied and deals unfinished.
The result is a broken system that delays procurement, frustrates both parties, and introduces unnecessary risk.
Reassessments: The forgotten priority
Adding to the complexity is the need to reassess critical vendors over time. Technology and threats evolve rapidly, and a vendor’s security posture today might not be the same six months from now. However, most security teams are so bogged down with initial assessments that they don’t focus on reassessments. This creates a dangerous gap in visibility and increases the likelihood of vulnerabilities slipping through the cracks.
How do we fix it?
If the traditional TPRM model is broken, how can we rebuild it? Here are a few key strategies.
1. Automate where possible
Leverage tools and platforms that automate aspects of vendor assessments, such as real-time monitoring of security postures, to reduce reliance on static questionnaires.
2. Adopt industry standards
HITRUST, with its risk- and threat-based approaches to security and compliance, provides a framework that can alleviate many of these challenges. Healthcare organizations and vendors can reduce inefficiencies and build a more robust TPRM program by leveraging HITRUST as a standardized assessment mechanism.
3. Join industry collaborators
The Health 3rd Party Trust (Health3PT) Initiative is a proactive group committed to reducing third-party information security risk with more reliable and efficient assurances. It has been established to evaluate, identify, and implement actionable and practical solutions that healthcare organizations can adopt to provide more reliable assurances, consistent information security program reporting, and better visibility into downstream relationships with third parties.
4. Implement continuous monitoring
Use continuous monitoring to track vendors’ security practices over time instead of relying solely on one-time assessments. This approach ensures risks are identified and addressed as they arise.
5. Enhance collaboration
Foster open communication between vendors and healthcare organizations to set clear expectations and establish mutual trust.
The path forward
Vendor risk management is at a breaking point in healthcare, but it doesn’t have to stay that way. We can reduce the burden on security teams and vendors alike by embracing automation, standardization, and continuous monitoring. Most importantly, we can create a TPRM program that balances efficiency with the need for robust security, ensuring that healthcare organizations can innovate safely while protecting patient data and trust.
The time for change is now. Let’s stop letting TPRM be a chokepoint and start using it as a competitive advantage.