Security Risk, Strategy & Governance

Comply with the Security Requirements of HIPAA or SOX – Executive Brief

Read our concise Executive Brief to find out why you should understand how to meet the security parts of HIPAA or SOX, review Info-Tech's methodology, and understand the...

Comply with the Security Requirements of HIPAA or SOX – Phases 1-3

This storyboard will walk you through the management of security compliance in regards to HIPAA and SOX. It will define gaps, and create an actionable roadmap to assist...

Comply with the Security Requirements of HIPAA or SOX – Phase 1: Assess Current State

The first phase of this project will walk through identifying and defining your compliance obligations. It will then move through a current state assessment of the...

Compliance Business Case Template

This template will allow you to plan your security compliance management for HIPAA and/or SOX. Document your goals, objectives, and other project steps in this template...

Security Compliance Translator Tool

This tool will allow you to review the security compliance requirements of HIPAA and SOX, and identify where there are existing gaps.

Comply with the Security Requirements of HIPAA or SOX – Phase 2: Perform a Gap Analysis

This phase will allow you to identify any existing gaps and create gap initiatives to close your security compliance requirements in HIPAA and/or SOX.

Comply with the Security Requirements of HIPAA or SOX – Phase 3: Build a Roadmap

This phase will assist in prioritizing compliance gap initiatives, and then creating an actionable roadmap to close any security compliance requirements in HIPAA and/or SOX.

Security Compliance Roadmap Tool

To close any existing security compliance gaps, focus on prioritizing gap initiatives and then creating a formal roadmap to ensure responsibility and timelines are...

Comply with the Security Requirements of HIPAA or SOX

Focus on translating wordy or ambiguous security obligations into security requirements that can be turned into actions and initiatives to be prioritized and carried out.
  • guided implementation icon

Risk Report

Create a succinct, impactful document that summarizes the outcomes from the risk assessment and highlights the IT risk council’s top recommendations to the senior...
GET HELP Contact Us
×
VL Methodology