Cloud 101CircleEventsBlog
Get 50% off the Cloud Infrastructure Security training bundle with code 'unlock50advantage'

Download Publication

Third-Party Vendor Risk Management in Healthcare
Third-Party Vendor Risk Management in Healthcare

Third-Party Vendor Risk Management in Healthcare

Release Date: 07/19/2022

The increased use of third-party vendors for applications and data processing services is a business model that is likely to continue, especially as HDOs find it necessary to focus limited resources on core organizational objectives and contract out support services. The HDO should assess the risks against the business objectives and mitigate them by implementing security controls. Continuous monitoring of third-party assets allows the HDO to detect and mitigate risks in near real-time.


Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Cloud Security for Startups 2024
Cloud Security for Startups 2024
Key Management for Public Cloud Migration
Key Management for Public Cloud Migration
Top Threats to Cloud Computing 2024 - Japanese Translation
Top Threats to Cloud Computing 2024 - Japanese ...
Texas Attorney General’s Landmark Victory Against Google
Texas Attorney General’s Landmark Victory Against Google
Published: 12/20/2024
10 Fast Facts About Cybersecurity for Financial Services—And How ASPM Can Help
10 Fast Facts About Cybersecurity for Financial Services—And How AS...
Published: 12/20/2024
How to Demystify Zero Trust for Non-Security Stakeholders
How to Demystify Zero Trust for Non-Security Stakeholders
Published: 12/19/2024
Winning at Regulatory Roulette: Innovations Shaping the Future of GRC
Winning at Regulatory Roulette: Innovations Shaping the Future of GRC
Published: 12/19/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.

Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training