ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

Download Publication

Third-Party Vendor Risk Management in Healthcare
Third-Party Vendor Risk Management in Healthcare

Third-Party Vendor Risk Management in Healthcare

Release Date: 07/19/2022

The increased use of third-party vendors for applications and data processing services is a business model that is likely to continue, especially as HDOs find it necessary to focus limited resources on core organizational objectives and contract out support services. The HDO should assess the risks against the business objectives and mitigate them by implementing security controls. Continuous monitoring of third-party assets allows the HDO to detect and mitigate risks in near real-time.


Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Healthcare Confidential Computing and the Trusted Execution Environment
Healthcare Confidential Computing and the Trust...
AI Controls Matrix
AI Controls Matrix
Identity Security: Cloud’s Weakest Link in 2025
Identity Security: Cloud’s Weakest Link in 2025
Published: 09/19/2025
RiskRubric: A New Compass for Secure and Responsible Model Adoption
RiskRubric: A New Compass for Secure and Responsible Model Adoption
Published: 09/18/2025
An Update on European Compliance: NIS2, CRA, DORA
An Update on European Compliance: NIS2, CRA, DORA
Published: 09/18/2025
Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by Region
Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement T...
Published: 09/17/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training