
The Silence of the LLMs – Part 2 of 2
If you have read Part 1 of this series, you are probably already familiar with the two methodologies we covered for pentesting AI
In the dynamic healthcare landscape, where innovation meets responsibility, safeguarding sensitive data is paramount. The stark reality is that our data is consistently under siege. In 2023, the healthcare sector witnessed a staggering 60% surge in data breaches, inflicting an average financial cost of $10.93 million per breach. This financial impact necessitates urgent action, emphasizing the need to fortify defenses and embrace cyber hygiene practices like HITRUST certification.
HITRUST was established in 2007 to address security and privacy concerns regarding sensitive information. At its core lies the Common Security Framework (CSF), a standard in healthcare data protection that validates an organization’s adherence to stringent healthcare data protection standards. The HITRUST CSF is designed for organizations that create, access, store, or share sensitive data.
Achieving HITRUST certification demands meticulous implementation of necessary controls in the designated environment. Voluntary yet pivotal, HITRUST aids businesses in aligning with mandatory regulations such as HIPAA, PCI DSS, and ISO 27001, making it a proactive framework for organizations navigating the complex terrain of data security.
2. Roadmap Execution
3. Incubation
4. Validated Assessment
5. Maintaining HITRUST Certification
HITRUST e1 Assessment is a foundational cybersecurity framework. It is an excellent starting point for organizations to get oriented with the HITRUST CSF framework.
HITRUST i1 Assessment is designed for healthcare organizations and business partners who require moderate assurance.
HITRUST r2 assessment is globally recognized as a high-level validation showing that an enterprise successfully manages risk by meeting and exceeding industry-defined standards for cybersecurity.
Companies must adhere to strong information security practices to become healthcare industry leaders. Among the various security credentials, HITRUST compliance stands out as the preferred choice sought by health clients. Achieving HITRUST certification increases the opportunities for organizations to expand their TAM (Total Addressable Market) and enhances their revenue potential.
According to research conducted by HITRUST, organizations that pursue HITRUST CSF certification witness remarkable improvements in their information security posture, with an impressive 97% of organizations successfully achieving and sustaining a robust security posture.
HITRUST CSF Certification contributes to the robust security of health data, intellectual property, and other proprietary information, bolstering data security and mitigating data breaches.
HITRUST’s robustness and comprehensive approach make achieving secondary security standards easier through established policies and controls.
To achieve the HITRUST Certification requirement, an organization must achieve a minimum score of 63% in each domain, which only applies to r2, and for e1 & i1, the minimum score is 83%
The HITRUST Control Maturity Scoring Rubric is a tool that evaluates the effectiveness of an organization’s information security and privacy program. It assigns a score to each control based on its maturity level. The score obtained through this rubric is a numerical or qualitative representation of how well an organization’s program aligns with the HITRUST framework.
The cost of a HITRUST Certification depends on the scope of the process and the assessment type. Additionally, costs are associated with purchasing the Validated HITRUST report and undergoing the assessment process. Accorian can help get you started with successfully scoping for your assessment and facilitating the process to reduce the cost, time, and resources.
Determining the appropriate HITRUST Assessment for your organization depends on several factors, with the primary consideration being the level of risk the organization is exposed to. If an organization has a lower risk, starting with an e1 or an i1 Assessment is recommended, while medium to high-risk organizations should opt for an r2 Assessment. Accorian can assist organizations in making this decision by working with your team to understand your goals, requirements, and contracts.
The entire HITRUST process may take 9 – 14 months
Yes, some of your internal employees will be called upon to assist. Members of the IT security team, operations infrastructure, administrative, and vendor management are all included.
To begin the Validated Assessment process, you must select an authorized HITRUST CSF Assessor. An authorized HITRUST CSF Assessor is a company approved by HITRUST to conduct assessments and offer other services related to the HITRUST CSF Assurance Program as well as the HITRUST CSF security and privacy framework.
After selecting an authorized HITRUST CSF assessor, you must purchase a Validated Assessment from HITRUST.
Achieving HITRUST CSF certification can be a challenging process. However, as an authorized HITRUST Assessor, Accorian specializes in assisting businesses of all sizes to achieve certification. Our security team possesses extensive experience in HITRUST implementation and certification, enabling us to serve as your full-service cybersecurity partner throughout the process. We work with you to reinforce your company’s compliance and ensure you meet all requirements for HITRUST certification.

If you have read Part 1 of this series, you are probably already familiar with the two methodologies we covered for pentesting AI

So, you’ve been tasked with pentesting an AI chatbot. Cool! You’re probably thinking “sweet, I get to mess with GPT and make it

What is ISO/IEC 42001 & Why It Matters As organizations accelerate the integration of artificial intelligence into core operations, heightened scrutiny around governance,