Cloud 101CircleEventsBlog
Take our State of SaaS Security Survey 2024 by February 29 to shape the future of secure SaaS usage!

Download Publication

Information Technology Governance, Risk and Compliance in Healthcare
Information Technology Governance, Risk and Compliance in Healthcare

Information Technology Governance, Risk and Compliance in Healthcare

Release Date: 10/15/2021

Information Technology (IT) Governance, Risk, and Compliance (GRC), are three words that have a significant impact on organizations. While each term seems straightforward, putting them together brings up a concept that is hard to understand and even harder to implement. Overall, GRC is the policies and procedures that manage the organization's process for aligning the management and control of information with business objectives, the organization's risk tolerance, and how they comply with regulations and manage risk. Defining each and then integrating them into one program gives the organization a structured process to ensure IT supports business objectives while managing risk and compliance. This paper will show how to create a program for each and then integrate them into one cohesive and effective program. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
The State of Security Remediation 2024
The State of Security Remediation 2024
Key Management Lifecycle Best Practices
Key Management Lifecycle Best Practices
3 Critical Steps for Application Security Teams in 2024
3 Critical Steps for Application Security Teams in 2024
Published: 02/23/2024
Other Practices Are Placing Greater Trust in AI... When Will Cybersecurity?
Other Practices Are Placing Greater Trust in AI... When Will Cybers...
Published: 02/22/2024
Zero Trust Messaging Needs a Reboot
Zero Trust Messaging Needs a Reboot
Published: 02/16/2024
Feeding from the Trust Economy: Social Engineering Fraud
Feeding from the Trust Economy: Social Engineering Fraud
Published: 02/12/2024

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Vincent Campitelli
Vincent Campitelli

Vincent Campitelli

After retiring from McKesson Corporation in 2016, Vince joined the Office of the President within the Cloud Security Alliance (CSA). Serving as an Enterprise Security Specialist, Vince supports the vast membership base of CSA in consuming and leveraging the numerous services, tools and expanding scope of research devoted to Cloud Computing. With his background in both the healthcare and financial service industries, Vince actively works wit...

Read more

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training