Cloud 101CircleEventsBlog

Download Publication

Third-Party Vendor Risk Management in Healthcare
Third-Party Vendor Risk Management in Healthcare

Third-Party Vendor Risk Management in Healthcare

Release Date: 07/19/2022

The increased use of third-party vendors for applications and data processing services is a business model that is likely to continue, especially as HDOs find it necessary to focus limited resources on core organizational objectives and contract out support services. The HDO should assess the risks against the business objectives and mitigate them by implementing security controls. Continuous monitoring of third-party assets allows the HDO to detect and mitigate risks in near real-time.


Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action
The Six Pillars of DevSecOps: Measure, Monitor,...
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Automated Cloud Remediation – Empty Hype, Viable Strategy, or Something in Between?
Automated Cloud Remediation – Empty Hype, Viable Strategy, or Somet...
Published: 05/17/2024
2024 State of SaaS Security Report Shows A Gap Between Security Team Confidence And Complexity of SaaS Risks
2024 State of SaaS Security Report Shows A Gap Between Security Tea...
Published: 05/16/2024
Navigating Cloud Security Best Practices: A Strategic Guide
Navigating Cloud Security Best Practices: A Strategic Guide
Published: 05/15/2024
How to Design an IT Service Model for End User Happiness
How to Design an IT Service Model for End User Happiness
Published: 05/15/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training