Cloud 101CircleEventsBlog

Download Publication

Third-Party Vendor Risk Management in Healthcare
Third-Party Vendor Risk Management in Healthcare

Third-Party Vendor Risk Management in Healthcare

Release Date: 07/19/2022

The increased use of third-party vendors for applications and data processing services is a business model that is likely to continue, especially as HDOs find it necessary to focus limited resources on core organizational objectives and contract out support services. The HDO should assess the risks against the business objectives and mitigate them by implementing security controls. Continuous monitoring of third-party assets allows the HDO to detect and mitigate risks in near real-time.


Download this Resource

Prefer to access this resource without an account? Download it now.

Agile Data Lake Threat Modeling
Agile Data Lake Threat Modeling
The Six Pillars of DevSecOps - Pragmatic Implementation
The Six Pillars of DevSecOps - Pragmatic Implem...
SaaS Governance Best Practices for Cloud Customers
SaaS Governance Best Practices for Cloud Customers
Compromise Detection vs. Threat Detection: Why ‘Right of Boom’ Now
Compromise Detection vs. Threat Detection: Why ‘Right of Boom’ Now
Published: 05/30/2023
The Top Five Challenges of Zero Trust Security
The Top Five Challenges of Zero Trust Security
Published: 05/24/2023
5 Essential Components of a Cloud DLP Solution
5 Essential Components of a Cloud DLP Solution
Published: 05/23/2023
How Can 3DS Authentication Enhance My Payments Flow?
How Can 3DS Authentication Enhance My Payments Flow?
Published: 05/23/2023
How to Fortify Your Salesforce Ecosystem Security
How to Fortify Your Salesforce Ecosystem Security
June 20 | TBD
Zero Trust & Cloud Security Meetup + Mission Critical Summit On Demand
Zero Trust & Cloud Security Meetup + Mission Critical Summit On Demand
July 11 | Online

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control, and Compliance Professional

Michael Roza

Risk, Audit, Control, and Compliance Professional

Since 2012 Michael has contributed to over 85 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud Ke...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training