Completed
Identify the inheritance controls
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Achieving HITRUST on a Budget
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 About me
- 3 Goals
- 4 Assumptions
- 5 Why HITRUST? - Multiple authoritative sources
- 6 Ginger HITRUST Journey
- 7 Ginger HITRUST Metrics (1/2)
- 8 Breakdown
- 9 Perform the gap assessment and remediation yourself
- 10 Gap Remediation
- 11 Make HITRUST part of your Information Security Program
- 12 Initiate an organization-wide Security Awareness Program
- 13 Get at least one team member HITRUST CCSEP certified
- 14 Identify the inheritance controls
- 15 Include technical controls in SDLC
- 16 Implement a SaaS Management tool
- 17 Electronically approve documentation
- 18 Start with the relevant scope
- 19 Document everything!
- 20 Summary