Page 130 - Cyber Defense eMagazine September 2022
P. 130
Solutions
Paramount to this new regulatory framework for data security is an agile-based compliance program that
can meet the different needs of each stakeholder.
Our stakeholders- employers, employees, and benefit brokers - have different requirements. We must
look at how we apply our agile-based, rigorous compliance program to meet their needs at varying levels.
As Genomic Life’s compliance officer, when our company signs on with a new client, I meet with their
security and compliance team to explain our current risk management program and the measures we
have to safeguard their stakeholders. There are numerous layers of responsibility we must account for
in rendering our services, and the comprehensive compliance program I’m describing allows us to plan
for these layers as they occur more effectively.
In Conclusion
All companies that manage sensitive customer data must invest in their overall compliance programs and
demonstrate compliance through verification with the highest certification bodies, such as HITRUST,
offering comprehensive cybersecurity management and evaluations. Companies that manage your data
should be trusted, but as the end consumer, it's crucial that you also verify.
Electronic data management is constantly evolving, requiring leaders to review their policies and redefine
governance, risk, and compliance programs to ensure the highest level of privacy and security measures.
This step fortifies the trust, but verify mandate.
Cyber Defense eMagazine – September 2022 Edition 130
Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.