ChaptersEventsBlog

Download Publication

Healthcare Supply Chain Cybersecurity Risk Management
Healthcare Supply Chain Cybersecurity Risk Management

Healthcare Supply Chain Cybersecurity Risk Management

Release Date: 05/11/2022

It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party service partners to minimize the risk of a supply chain exploitation. Internal security policies of a HDO need to be upheld to include external supply chain risk and vendor assessments, as a compromised network can put systems at risk. Many global factors may potentially disrupt a supply chain, so risk monitoring and response are critical for an HDO to mitigate vulnerability exposure threats across their supply chain infrastructure. A formal risk rating process for suppliers provides an effective way to evaluate the risk tolerance and appetite of its supply chain.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Healthcare Confidential Computing and the Trusted Execution Environment
Healthcare Confidential Computing and the Trust...
AI Controls Matrix
AI Controls Matrix
AI in Medical Research: Applications & Considerations
AI in Medical Research: Applications & Consider...
What is GenAI Runtime Defense (GARD)?
What is GenAI Runtime Defense (GARD)?
Published: 11/06/2025
Streamlining Cloud Compliance Audits Using AI and Automation
Streamlining Cloud Compliance Audits Using AI and Automation
Published: 11/05/2025
Identity Security Posture Management
Identity Security Posture Management
Published: 11/03/2025
Beyond Generative AI – My Journey to Expert-Guided AI
Beyond Generative AI – My Journey to Expert-Guided AI
Published: 10/31/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training