HITRUST Community Extension Program

Education and Collaboration On Risk Management And Cybersecurity

Coordinated by HITRUST, hosted by Evolve IP, and facilitated by Wipfli, the one-day, no cost, town hall meeting will provide organizations of all types and sizes an opportunity to engage with peers to discuss the challenges, best practices and lessons learned in effectively implementing a risk management program and improving cybersecurity practices by leveraging the HITRUST CSF, HITRUST cyber threat sharing and response, and other HITRUST programs.

Click the link below to register for
Wednesday, July 11 from 8:30 AM-1:00 PM ET
Greater Philadelphia Area

Event Overview

“We are extremely pleased to be a part of the Community Extension Program in Philadelphia,” said Joe Pedano, Executive Vice President of Cloud Engineering of Evolve IP. “This event provides a great opportunity for executives and IT professionals in healthcare, financial services, and every industry we serve to learn more about the risk management benefits of the HITRUST CSF and how it is foundational in securing cloud-based services.”

Paul Johnson, a Partner with Wipfli LLP, agreed that the educational opportunity for attendees is special. “We’re thrilled to be part of the CEP program,” he explained. “With more and more organizations adopting the HITRUST CSF to manage their security risk and that of the vendors they rely upon, there’s a tremendous need to help business and IT leaders alike understand, embrace, and adjust to these security requirements.”

Topics Covered

  • Structuring and implementing an information risk management program
  • Considerations in implementing the HITRUST CSF
  • Leveraging the HITRUST CSF to implement the NIST Cybersecurity Framework
  • Considerations regarding a HITRUST CSF Assessment and reporting options
  • Leveraging the HITRUST Cyber Threat Catalogue
  • Implementing a third-party assurance program and effective vendor risk management
  • How to align information risk management and cyber insurance programs
  • Engaging in cyber information sharing and how it supports cyber threat management regardless of size or cyber maturity