Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Download Publication

Healthcare Supply Chain Cybersecurity Risk Management
Healthcare Supply Chain Cybersecurity Risk Management

Healthcare Supply Chain Cybersecurity Risk Management

Release Date: 05/11/2022

It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party service partners to minimize the risk of a supply chain exploitation. Internal security policies of a HDO need to be upheld to include external supply chain risk and vendor assessments, as a compromised network can put systems at risk. Many global factors may potentially disrupt a supply chain, so risk monitoring and response are critical for an HDO to mitigate vulnerability exposure threats across their supply chain infrastructure. A formal risk rating process for suppliers provides an effective way to evaluate the risk tolerance and appetite of its supply chain.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
Information Technology Governance, Risk, and Compliance in Healthcare v2
Information Technology Governance, Risk, and Co...
Data Loss Prevention in Healthcare
Data Loss Prevention in Healthcare
Modern Terms and Concepts for a  Zero Trust Mindset
Modern Terms and Concepts for a Zero Trust Mindset
Published: 07/26/2024
Top 4 Use Cases of Non-Human Identity Security: Live Event Recap
Top 4 Use Cases of Non-Human Identity Security: Live Event Recap
Published: 07/26/2024
Adding a Twist to the Epic of Vulnerability Management
Adding a Twist to the Epic of Vulnerability Management
Published: 07/25/2024
Asking the Right Questions About ASPM
Asking the Right Questions About ASPM
Published: 07/24/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Control and Compliance Professional at EVC

Michael Roza

Risk, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training