How to address business complexities when leveraging service providers. HITRUST’s new program will enable organizations and their service providers to understand and agree on responsibilities and roles regarding ownership and operation of security controls.
How the rapid growth of organizations that depend on cloud services, coupled with the amount of data stored in cloud environments, requires a clear understanding of the obligations of organizations that store and protect sensitive information.
How to remove the guesswork, ambiguity, and confusion that comes with defining the roles and responsibilities between customer and their cloud service provider by outlining data governance, information risk management and regulatory compliance requirements in clear, concise language.
How the program helps identify the respective security control operation responsibilities of the customer and service provider to avoid misunderstandings, establishes comprehensive assessment guidance ensuring effective assessment and review of the controls operations and streamlines and automates the process of inheriting controls in a shared responsibility model.
Chief Audit Officer
Chief Information Officer
Chief Information Security Officer
Chief Privacy Officer
Chief Procurement Officer
Chief Security Architect
Chief Technology Officer
Director of Compliance
Director of Information Security
Director of Technology/Information Technology
Enterprise Risk Manager
Information Assurance Manager
Information Technology Director
Internal Audit Professional
Supply Chain Management
Technical Security Officer
Third-Party Risk Manager
Vice President of Information Technology
Vice President of Technology