Navigating Third-Party Vendor Risk with Management and Secure Access
- Identify the risks posed by third-party vendors, from contracting to risk assessments.
- Define the importance of vendor privileged access management.
- Outline the best practices to identify, assess, and prioritize vulnerabilities, and pick the right security tools to support the process
- Describe the differences between managing network access for internal vs. third-party vendors
About the speaker:
Mitchell Parker, MBA, CISSP, is the Executive Director of Information Security and Compliance at IU Health. Mitch’s focus is on addressing the business needs of Information Security across the organization, contract and vendor management, risk management, and researching and developing security controls for emerging technologies. In addition to his work at IU Health, Mitch speaks at multiple conferences and writes for multiple publications, including CSO, Healthcare IT News, Health Tech Magazine, HealthsystemCIO.com, and SecurityCurrent. Mitch also contributed to Voices of Innovation, recently published by HIMSS, and wrote a textbook chapter on Healthcare Cybersecurity and Regulatory Requirements for a Healthcare Informatics textbook to be published this year.