How Do the New i1 and r2 Assessments Enable Security for More Businesses?

Logo
Presented by

Andrew Ange, Michael Parisi

About this talk

Some privacy and data protection regulations require the data to be protected “appropriately” and according to “best practice” without specifying what this means. This leaves the burden on the organization seeking compliance to determine what controls should be implemented and then execute them. The HITRUST i1 and r2 Validated Assessments are a set of security controls that incorporate the HITRUST approach and help organizations that work with sensitive data to become more secure. These frameworks are designed to provide a flexible and configurable standard that organizations can use to develop cybersecurity strategies compliant with the HIPAA, ISO, NIST, SOC 2, CMMC, PCI-DSS, and many other data protection regulations. Join Avertium and HITRUST for a discussion on the insurance continuum, assessment use cases, and stakeholder risk. Moderator - Dara Gibson | Alliance Manager at Avertium Andrew Ange | Managing Consultant - Governance, Risk, and Compliance at Avertium Michael Parisi | VP of Adoption at HITRUST
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (6)
Subscribers (781)
Avertium is the security partner that companies turn to for end-to-end cybersecurity solutions that attack the chaos of the cybersecurity landscape with context. By fusing together human expertise and a business-first mindset with the right combination of technology and threat intelligence, Avertium delivers a more comprehensive, more programmatic approach to cybersecurity - one that drives action on the ground and influence in the boardroom. That's why over 1,200 mid-market and enterprise-level organizations across 15 industries turn to Avertium when they want to be more efficient, more effective, and more resilient when waging today's cyber war.