HITRUST Community Extension Program

by Ms. Christen Moribondo of Evolve IP

Posted to Event on 6/7/2018 at 11:15 AM

{"ops":[{"attributes":{"color":"#333333"},"insert":"Evolve IP and Wipfli are holding a HITRUST Community Extension Program in Philadelphia, PA on July 11"},{"attributes":{"color":"#333333","script":"super"},"insert":"th"},{"attributes":{"color":"#333333"},"insert":" 2018 "},{"attributes":{"underline":true,"color":"#f47920","link":"https://cvent.me/WBvNL"},"insert":"(click here to register)"},{"attributes":{"color":"#333333"},"insert":". Coordinated by HITRUST, hosted by Evolve IP, and facilitated by Wipfli, the one-day, no cost, town hall meeting will provide organizations of all types and sizes an opportunity to engage with peers to discuss the challenges, best practices and lessons learned in effectively implementing a risk management program and improving cybersecurity practices by leveraging the "},{"attributes":{"underline":true,"color":"#f47920","link":"https://hitrustalliance.net/hitrust-csf/"},"insert":"HITRUST CSF"},{"attributes":{"color":"#333333"},"insert":", HITRUST cyber threat sharing and response, and other HITRUST programs. Some of the topics that will be covered include:"},{"insert":"\n"},{"attributes":{"color":"#333333"},"insert":" "},{"insert":"\n"},{"attributes":{"color":"#333333"},"insert":"·        Structuring and implementing an information risk management program"},{"insert":"\n"},{"attributes":{"color":"#333333"},"insert":"·        Considerations in implementing the HITRUST CSF"},{"insert":"\n"},{"attributes":{"color":"#333333"},"insert":"·        Leveraging the HITRUST CSF to implement the NIST Cybersecurity Framework"},{"insert":"\n"},{"attributes":{"color":"#333333"},"insert":"·        Considerations regarding a HITRUST CSF Assessment and reporting options"},{"insert":"\n"},{"attributes":{"color":"#333333"},"insert":"·        Leveraging the HITRUST Cyber Threat Catalogue"},{"insert":"\n"},{"attributes":{"color":"#333333"},"insert":"·        Implementing a third-party assurance program and effective vendor risk management"},{"insert":"\n"},{"attributes":{"color":"#333333"},"insert":"·        How to align information risk management and cyber insurance programs"},{"insert":"\n"},{"attributes":{"color":"#333333"},"insert":"·        Engaging in cyber information sharing and how it supports cyber threat management regardless of size or cyber maturity"},{"insert":"\n"},{"attributes":{"color":"#333333"},"insert":" "},{"insert":"\n"},{"attributes":{"color":"#333333"},"insert":"For more information about the Community Extension Program held in Philadelphia, or to register, visit our events page "},{"attributes":{"underline":true,"color":"#f47920","link":"https://www.evolveip.net/about/events"},"insert":"here"},{"attributes":{"color":"#333333"},"insert":"."},{"insert":"\n"}]}


Share This Post With Others