Cloud 101CircleEventsBlog
CAIQ Lite is now accepted into the STAR Registry! Showcase your cloud security readiness with a simplified assessment. Learn more today!

Download Publication

Healthcare Supply Chain Cybersecurity Risk Management
Healthcare Supply Chain Cybersecurity Risk Management

Healthcare Supply Chain Cybersecurity Risk Management

Release Date: 05/11/2022

It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party service partners to minimize the risk of a supply chain exploitation. Internal security policies of a HDO need to be upheld to include external supply chain risk and vendor assessments, as a compromised network can put systems at risk. Many global factors may potentially disrupt a supply chain, so risk monitoring and response are critical for an HDO to mitigate vulnerability exposure threats across their supply chain infrastructure. A formal risk rating process for suppliers provides an effective way to evaluate the risk tolerance and appetite of its supply chain.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
AI in Medical Research: Applications & Considerations
AI in Medical Research: Applications & Consider...
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
Information Technology Governance, Risk, and Compliance in Healthcare v2
Information Technology Governance, Risk, and Co...
Reflections on NIST Symposium in September 2024, Part 2
Reflections on NIST Symposium in September 2024, Part 2
Published: 10/10/2024
To Secure the AI Attack Surface, Start with Fundamental Cyber Hygiene
To Secure the AI Attack Surface, Start with Fundamental Cyber Hygiene
Published: 10/10/2024
AI and Data Protection: Strategies for LLM Compliance and Risk Mitigation
AI and Data Protection: Strategies for LLM Compliance and Risk Miti...
Published: 10/09/2024
Healthcare & Cybersecurity: Navigating a Vast Attack Surface
Healthcare & Cybersecurity: Navigating a Vast Attack Surface
Published: 10/08/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training