All Episodes

Displaying 41 - 60 of 101 in total

Episode 41 — Cryptography Requirements for i1

Cryptography under the i1 program focuses on ensuring that sensitive data remains confidential and tamper-proof during storage and transmission. Candidates must unders...

Episode 42 — Logging Strategy for i1

The i1 program raises expectations for logging by requiring organizations to implement a structured, consistent strategy that enables effective monitoring and investig...

Episode 43 — Monitoring and Alerting for i1

Monitoring and alerting complement the logging function by transforming raw data into actionable security intelligence. Under i1, organizations are expected to maintai...

Episode 44 — Incident Response Expectations for i1

At the i1 level, incident response maturity progresses from planning to measurable execution. Candidates must understand that HITRUST expects organizations to not only...

Episode 45 — Business Continuity and Disaster Recovery Proofs for i1

Business continuity and disaster recovery (BC/DR) controls under the i1 program require organizations to prove they can maintain essential operations during disruptive...

Episode 46 — Secure SDLC Controls for i1

Secure software development lifecycle (SDLC) controls at the i1 level ensure that security is integrated into every phase of system and application development. Candid...

Episode 47 — Third-Party Risk Management for i1

Third-party risk management (TPRM) under i1 validates that vendors and partners maintain appropriate security practices aligned with organizational expectations. Candi...

Episode 48 — Workforce Security and Training for i1

Workforce security at the i1 level combines personnel screening, access control, and ongoing education into a unified assurance domain. Candidates must recognize that ...

Episode 49 — Physical and Environmental Controls for i1

Physical and environmental controls ensure that facilities housing sensitive data or systems remain protected from unauthorized access, damage, or disruption. Under i1...

Episode 50 — Metrics, KRIs, and PRISMA Tie-In for i1

Metrics and Key Risk Indicators (KRIs) under i1 provide measurable insight into control effectiveness and residual risk. Candidates must understand that HITRUST integr...

Episode 51 — Internal Reviews and Readiness Checks for i1

Internal reviews and readiness checks ensure that organizations entering the i1 assessment are fully prepared for external validation. Candidates must understand that ...

Episode 52 — Writing Narratives and Cross-References for i1

Writing clear narratives and cross-references is a crucial part of demonstrating control effectiveness within MyCSF. Candidates must understand that narratives explain...

Episode 53 — Packaging and Submitting an i1 Assessment

Packaging and submission represent the final stages of the i1 journey, where all documentation, evidence, and assessor testing results are consolidated for HITRUST QA ...

Episode 54 — CAPs and Maintaining Momentum for i1

Corrective Action Plans (CAPs) are formal mechanisms for addressing deficiencies identified during an i1 assessment. Candidates must understand that HITRUST requires C...

Episode 55 — i1 Recap & Quick Reference

The i1 program represents a significant step up in operational assurance from e1, validating that security controls are actively implemented, monitored, and improved. ...

Episode 56 — Why r2 and What It Requires

The r2 assessment is the highest level of assurance within the HITRUST framework, designed for organizations seeking comprehensive validation of security and complianc...

Episode 57 — HITRUST QA Expectations and Rework Loops

Quality Assurance (QA) is the final gate before HITRUST issues certification, and understanding its requirements is critical for r2 success. Candidates must know that ...

Episode 58 — Tailoring and Scoping for r2

Tailoring and scoping define the foundation of an r2 assessment, determining which controls apply based on system, organization, and regulatory context. Candidates mus...

Episode 59 — Organizational and System Factors

Organizational and system factors are key inputs that define how HITRUST customizes assessments under the r2 framework. Candidates must understand that these factors i...

Episode 60 — Control Selection Logic at r2

Control selection logic under r2 determines how HITRUST chooses which requirements apply to an organization’s specific environment. Candidates must understand that thi...

Broadcast by