How Do the New i1 and r2 Assessments Enable Security for More Businesses?

Presented by

Andrew Ange, Michael Parisi

About this talk

Some privacy and data protection regulations require the data to be protected “appropriately” and according to “best practice” without specifying what this means. This leaves the burden on the organization seeking compliance to determine what controls should be implemented and then execute them. The HITRUST i1 and r2 Validated Assessments are a set of security controls that incorporate the HITRUST approach and help organizations that work with sensitive data to become more secure. These frameworks are designed to provide a flexible and configurable standard that organizations can use to develop cybersecurity strategies compliant with the HIPAA, ISO, NIST, SOC 2, CMMC, PCI-DSS, and many other data protection regulations. Join Avertium and HITRUST for a discussion on the insurance continuum, assessment use cases, and stakeholder risk. Moderator - Dara Gibson | Alliance Manager at Avertium Andrew Ange | Managing Consultant - Governance, Risk, and Compliance at Avertium Michael Parisi | VP of Adoption at HITRUST
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (12)
Subscribers (900)
Assembling and maintaining all of the components of risk management and compliance programs comes with unique challenges. HITRUST understands and has built an integrated approach to solving these problems with components that are aligned, maintained, and comprehensive to support your organization’s goals.