HITRUST
Since it was founded in 2007, HITRUST has championed programs that safeguard sensitive information and manage information risk for global organizations across industries and throughout the third-party supply chain. Today, HITRUST collaborates with public and private sector experts in privacy, information security, and risk management to identify emerging threats and help organizations ensure they take the most effective steps to avoid them. HITRUST provides organizations with the ultimate tools to earn trust by proving their cyber maturity.
Promotions
Read The blog for the Audio and Video Podcasts
What makes a security certification actually reliable—and how do you measure that value over time? In this episode, HITRUST shares findings from their 2025 Trust Report, revealing how real-world threat data, quality assurance, and continuous validation are reshaping the way organizations—and their partners—view risk, resilience, and trust.
Cybersecurity assessments can’t be one-and-done—and they can’t rely on outdated frameworks. This episode explores how a threat-adaptive model helps organizations stay in sync with real-world attacks by aligning assessments to live data, enabling more accurate control scoping, better boardroom conversations, and stronger third-party assurance.
In this Brand Story episode, Ryan Patrick, VP of Adoption at HITRUST, joins the conversation following HIMSS to share how HITRUST is helping healthcare organizations strengthen security, manage third-party risk, and support interoperability with a tiered approach to assessments. With record-breaking attendance at HIMSS, the discussion highlights why organizations are turning to HITRUST for scalable, efficient ways to navigate compliance and protect patient data.
In this Brand Story episode, Ryan Patrick, Vice President of Adoption at HITRUST, shares how HITRUST’s dynamic approach to cybersecurity and risk management is helping healthcare organizations achieve an industry-leading breach rate of less than 1%. With insights on AI security, threat intelligence, and the power of continuous improvement, this conversation is a must-listen for anyone serious about protecting healthcare data and enhancing risk management strategies.
If you’re seeking a stronger, simpler way to secure cyber insurance, don’t miss this opportunity to learn from the experts. Join us for this conversation to learn how the HITRUST Shared Risk Facility empowers organizations with: streamlined coverage application, shorter underwriting timelines, and consistent renewals and competitive premiums.
Discover how HITRUST's R2 certification is revolutionizing cyber insurance by providing a quantifiable measure of cybersecurity maturity, easing the insurance acquisition process, and potentially lowering premiums. Join Sean Martin as he speaks with Robert Booker and Blake Sutherland to explore this groundbreaking approach and its benefits for organizations and underwriters alike.
In this new HITRUST Brand Story we explore advancements in healthcare through AI technology. Broadcasting live from HITRUST Collaborate 2024, Sean Martin leads a conversation with Walter Haydock of StackAware and Steve Dufour of Embold Health.
HITRUST, the leader in information risk management, security, and compliance assurances, today announces enhancements to the HITRUST Assessment Xchange, its comprehensive third-party risk management (TPRM) solution, overcoming legacy challenges and making TPRM practical and effective for organizations across all industries. In addition, HITRUST is announcing integrations with leading TPRM solution platforms to address the current “last mile” challenge of capturing and consuming detail assurance information and performing population risk analysis. The first platform will be available in Q4 2024, and the company is currently accepting participants into its private preview program.
Join Sean Martin as he interviews Jeremy Huval, Chief Innovation Officer at HITRUST, discussing the latest advancements in AI security and risk management. Discover how HITRUST's innovative framework and new AI Security Certification will helping organizations safeguard their AI capabilities and ensuring compliance with the ever-evolving landscape of AI threats.
HITRUST releases 2025 vision to increase security sustainability and outcomes through continuous control monitoring.
A Their Story conversation with John Houston, VP, Information Security and Privacy; Associate Counsel at UPMC and Michael Parisi, VP of adoption at HITRUST
The U.S. Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) released a Request for Information (RFI) seeking input from the public on two requirements of the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH Act), as amended in 2021. How does it impact cybersecurity and risk management programs? Why do (should) CISOs care about this? Are we about to throw more money at this problem?
Maybe a smart question: Is there an opportunity to be smarter?
Listen in to learn more about the RFI and the role you can have in shaping its outcome.
Not in the healthcare space? You should still pay attention. There's a lot going on in the healthcare sector that other industries can leverage.
A Their Story conversation with Lee Barrett, Executive Director at Electronic Healthcare Network Accreditation Commission, and Michael Parisi (VP of adoption at HITRUST)
Patients, and their providers, deserve to have immediate, accurate access to their personal health information so they can get the best healthcare possible. How and where does the concept of interoperability come into play for a number of societal issues and patient care delivery challenges we are trying to solve for? Let's look at TEFCA to find out.
in today's story, we are joined by two organizations—HITRUST and EHNAC—dedicated to making the healthcare ecosystem thrive by reducing friction in risk management and in supply chain interoperability. This spirit couldn't be applied at a better time with the recent release of TEFCA—the Trusted Exchange Framework and Common Agreement.
A Their Story conversation with John Overbaugh (ASG), Michael Tiemeyer (Teladoc Health), and Michael Parisi (VP of adoption at HITRUST)
Taking responsibility for what we build and how we secure it matters. Especially in the ways we talked about during today’s Their Story episode? It matters to the business partners. It matters to the customers. And, as pointed out by Mike Parisi during this conversation, it matters to society.
There are many reasons why organizations large and small choose HITRUST to help them through their security, risk, and compliance journey.
Why do you choose HITRUST?
A Their Story conversation with Rudi Perkins (Welvie) And Blaise Wabo (A-LIGN), customer and partner of HITRUST, respectively
Suppose you're like Rudi, who, six years ago, tried to bring his organization to an effective level of compliance and increase his security posture by managing multiple spreadsheets. In that case, you're probably finding yourself going nuts — just like Rudi did, and many others do, when faced with a similar complex and overwhelming situation.
Thankfully, this is when Rudi's and Blaise's stories — individually and collectively — can make a world of difference for you.
They've figured many things out: they found the right processes, tools, and partners to make this experience better overall. They've created an experience they want, driven by a common framework that maps all of those things together, giving you the means to do the controls assessment, identify and mitigate the gaps, and then apply that work to many standards, frameworks, and regulations in the US and abroad.
In short, what HITRUST and its Assessor community are doing here is to enable the business — individually and collectively as part of a larger supply chain — to operate securely within the boundaries of the regulatory and industry requirements for which they must abide.
“Our customers expect that of us. Our partners expect that of us. We should expect that of each other and of ourselves too.” —Sean Martin
Their Story conversations with Sean Martin and HITRUST executives, customers, and partners
This is a 2-part podcast and webcast series with HITRUST executives along with some of their strategic customers and partners. The series explores the value of a formal risk management program coupled with a well-formed culture of security and business continuity that focuses on the impact a crisis can have on the customer.
Bookmark this page to catch all of the episodes as they become available.
HITRUST PARTNER STORIES
Blue Lava
Blue Lava is the first business platform for CISOs to manage their security program. Blue Lava guides security leaders to effectively measure, optimize, and communicate their security program with confidence and ease, in one platform.
Recent Promotions
Audio and Video Podcasts
Nintex
Nintex is the global standard for business process management and automation. The Nintex platform helps their clients accelerate progress on their digital transformation journeys by quickly and easily managing, automating and optimizing business processes.
Recent Promotions
Audio and Video Podcasts
Edgescan
Edgescan offers continuous vulnerability intelligence as a service. Accurately identifying vulnerabilities and exposures across the full stack. All threats are verified by cybersecurity experts, providing exploitable risk and remediation guidance, virtually false-positive free.
Recent Promotions
Audio and Video Podcasts
Devo
Devo unlocks the full value of machine data for the world’s most instrumented enterprises. The Devo data analytics platform addresses the explosion in volume of machine data and the crushing demands of algorithms and automation.
Recent Promotions
Audio and Video Podcasts
ReversingLabs
Recent Promotions
Audio and Video Podcasts
Commercial software supply chain risk is no longer theoretical—breaches show trusted vendors can introduce vulnerabilities or malicious code into critical environments. This episode reveals how organizations can implement technical controls to analyze and verify any software they run, turning visibility into actionable risk reduction.
A Their Story conversation with Sean Martin and Marco Ciappelli
Guest: Erik Thoen
The last time we got together with ReversingLabs was during RSA Conference San Francisco 2020. Back then, we spoke with Mario Vuksan And Tyson Whitten to learn about how the black box of machine learning and artificial intelligence is giving InfoSec professionals a few headaches. A lot has remained the same on this front. Still, a lot has changed since then for many organizations’ SOC teams: work from home environments, disruptive digital and business transformation, rapid cloud deployments, and the ever-dreaded “do more with less budget” operational tactic — to mention just a few.
So, with all that we are now dealing with, how do we find the best path to better information security?
Have a listen.
A Their Story conversation with Sean Martin and Marco Ciappelli
Guests: Mario Vuksan, CEO & Co-Founder, ReversingLabs | Tyson Whitten, VP, Global Marketing, ReversingLabs
CHAPTER 2: Does the black box of machine learning and artificial intelligence give you a headache? If so, it’s like the lack of visibility into how new (dare we say, “next-gen”) information technologies work. This is beginning to give pause to many organizations looking to leverage such technologies to help them succeed with their IT security management programs. Without a view into how the data is analyzed paired with a lack of visibility for how the results can be connected back to the operations—and the business—means that organizations are forced to blindly trust that their vendors are doing the best things, the right thing.
So, how come we can’t get this visibility? What’s holding us back? Have a listen to Mario’s and Tyson’s view to hear how they see these headaches being treated in the not-so-distant future.
A Their Story interview with Marco Ciappelli & Sean Martin
Guest: Mario Vuksan, Founder and CEO, ReversingLabs
This is a story that started about ten years ago; however, in some ways it goes back a bit further than that—and perhaps we will never catch up with the present.
Is a story about a different approach to cybersecurity that has, at its core, a profound desire to understand how technology works and evolves; that places security center-stage in every discipline related—not only to computer science—but to all activities connected to the well-being and progressive development of our society.
Cequence
Recent Promotions
Audio and Video Podcasts
SecureStack
Recent Promotions
Audio and Video Podcasts
DomainTools
Recent Promotions
Audio and Video Podcasts
OPSWAT
Recent Promotions
Audio and Video Podcasts
Silverfort
Recent Promotions
Audio and Video Podcasts
Juniper
Recent Promotions
Audio and Video Podcasts
RSA Security
Recent Promotions
Audio and Video Podcasts
Sophos
Recent Promotions
Audio and Video Podcasts
Yubico
Recent Promotions
Audio and Video Podcasts
Humio
Recent Promotions
Audio and Video Podcasts
NowSecure
Recent Promotions
Audio and Video Podcasts
Island
The modern web browser is the single most commonly used application by enterprises worldwide. Its power, simplicity, and usability makes it an essential tool at work. Unfortunately, consumer browsers lack the fundamental controls enterprises require to ensure proper security, visibility, and governance over critical apps and data. Until now.