Healthcare compliance practice environment
The Practice

Five disciplines. One senior practitioner.

Each discipline is delivered as a discrete engagement or as part of a unified program build. The same senior practitioner scopes, writes, and closes the work end to end.

VHCG · The Practice
Note on Method The Practice

Programs are scoped around the regulatory obligation that brought you in, the assessment timeline you are working against, and the controls already in place. The deliverables vary engagement to engagement. The approach does not.

What follows are the five disciplines the firm is engaged for. Specifics belong to the scoping conversation, not the marketing page.

Compliance program documentation environment
01 / FOUNDATION
Discipline I Program Advisory

Compliance Program Advisory

Programs designed to operate without the firm after handoff.

The firm is engaged when an organization needs a defensible compliance program built from the ground up, or when an existing program has accreted into a binder no one can answer for. Either situation calls for the same response: governance written against the actual infrastructure, policies that reflect how the organization actually operates, and a risk posture the board can sign without qualification.

Work product is built as living documentation the internal team owns at closeout. Nothing in the deliverable depends on the firm staying in the room.

Program Design Governance Charter Policy Library Board Reporting
Privacy and security framework environment
02 / PRIVACY
Discipline II Privacy & Security

Privacy & Security

Programs built for the assessor, not the binder.

HIPAA, HITRUST CSF, SOC 2, and NIST 800-53 architecture mapped against the client's actual technical environment. The work begins with a clear-eyed read of where the program sits today and ends with documentation an independent assessor can defend without the firm in the room.

Risk assessments are performed, not generated. Gap analyses arrive with named owners and realistic remediation timelines. Privacy programs are designed by a practitioner with dual IAPP credentials, not assembled from a template library.

HIPAA HITRUST CSF SOC 2 NIST 800-53 Privacy Program Design
Audit preparation and evidence environment
03 / AUDIT
Discipline III Audit Support

Audit Support

The work between the policy and the closing memo.

The firm is engaged in the weeks leading into an independent assessment and stays engaged through the closing memo. Evidence packages are prepared the way an assessor expects to see them. Walkthroughs are rehearsed. Findings are anticipated and addressed before they land in the report.

Third-party risk programs and vendor compliance workflows are built into the same engagement when the assessment scope requires it. The firm has stood inside the OIG audit chair and inside the client side of a HITRUST review. Both views inform the work.

Audit Readiness Evidence Packaging TPRM Vendor Compliance Assessor Coordination
AI governance and model risk environment
04 / EMERGING
Discipline IV AI Governance

AI Governance

A discipline most firms cannot deliver yet.

ISO 42001 Artificial Intelligence Management Systems and the NIST AI Risk Management Framework are now real obligations for organizations deploying clinical or administrative AI. The regulatory floor is still forming. The firms most exposed are the ones moving fastest.

The firm is engaged to translate emerging governance requirements into operating programs the organization can run today. The principal holds the Lead Auditor credential for ISO 42001, which is one of the smaller pools of practitioners qualified to do this work.

ISO 42001 NIST AI RMF Model Risk AI Policy Algorithmic Audit
Assessment and gap analysis review environment
05 / DIAGNOSTIC
Discipline V Assessments & Gap Analysis

Assessments & Gap Analysis

The honest read on where the program stands today.

Before a program build commits to a direction, the organization needs a defensible picture of current posture. The firm is engaged to run focused diagnostic reviews against the framework or set of frameworks the client is exposed to. HIPAA Security Rule, HITRUST CSF, SOC 2 Trust Services Criteria, NIST 800-53, ISO 27001, ISO 42001, or a combined cross-walk. The output is a structured gap report and a prioritized remediation roadmap the client owns.

Assessments are scoped as standalone diagnostic engagements or as the opening phase of a larger program build. Either way the deliverable is the same: named gaps, evidence cited, owners assigned, and remediation sequenced against the assessment timeline that brought the client in. No theater. No generic findings. No padding.

HIPAA Security Rule HITRUST Readiness SOC 2 Gap Review NIST 800-53 Cross-Framework Map Remediation Roadmap
Regulatory Fluency
HIPAA HITRUSTCSF SOC 2 NIST 800-53 ISO 27001 ISO 42001 FedRAMP HITECH
Engage the Firm

Specifics belong to the conversation.

Thirty minutes, direct with the principal. We discuss the regulatory obligation, your current posture, and which discipline fits. A fixed-scope proposal follows when the fit is right.