Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Healthcare Supply Chain Cybersecurity Risk Management
Healthcare Supply Chain Cybersecurity Risk Management

Healthcare Supply Chain Cybersecurity Risk Management

Release Date: 05/11/2022

It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party service partners to minimize the risk of a supply chain exploitation. Internal security policies of a HDO need to be upheld to include external supply chain risk and vendor assessments, as a compromised network can put systems at risk. Many global factors may potentially disrupt a supply chain, so risk monitoring and response are critical for an HDO to mitigate vulnerability exposure threats across their supply chain infrastructure. A formal risk rating process for suppliers provides an effective way to evaluate the risk tolerance and appetite of its supply chain.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
AI in Medical Research: Applications & Considerations
AI in Medical Research: Applications & Consider...
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
Information Technology Governance, Risk, and Compliance in Healthcare v2
Information Technology Governance, Risk, and Co...
Establishing an Always-Ready State with Continuous Controls Monitoring
Establishing an Always-Ready State with Continuous Controls Monitoring
Published: 11/21/2024
Managing AI Risk: Three Essential Frameworks to Secure Your AI Systems
Managing AI Risk: Three Essential Frameworks to Secure Your AI Systems
Published: 11/19/2024
Top Threat #5 - Third Party Tango: Dancing Around Insecure Resources
Top Threat #5 - Third Party Tango: Dancing Around Insecure Resources
Published: 11/18/2024
The Rocky Path of Managing AI Security Risks in IT Infrastructure
The Rocky Path of Managing AI Security Risks in IT Infrastructure
Published: 11/15/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training