Webinar

Navigating Third-Party Vendor Risk with Management and Secure Access

   
       

Navigating Third-Party Vendor Risk with Management and Secure Access

Providers and other covered entities rely heavily on third-party vendors and other business associates to provide seamless care transactions. However, the need for greater data access expands the threat surface and increases risk when those access points and contractual relationships aren’t properly managed.
 
As healthcare continues to be a prime target for hackers, digital environments need to be protected to ensure providers aren’t exposing their organization to HIPAA compliance issues, security incidents, or even a breach of patient data. Vendor management refers to both ensuring security standards are included in the contracting process, creating a complete data inventory, and identifying just who has access and when.
 
As the Executive Director of Information Security and Compliance at IU Health, Mitchell Parker, MBA, CISSP, focuses on addressing the business needs of Information Security across the organization, contract and vendor management, risk management, and researching and developing security controls for emerging technologies.
 
Learning objectives
  • Identify the risks posed by third-party vendors, from contracting to risk assessments.
  • Define the importance of vendor privileged access management.
  • Outline the best practices to identify, assess, and prioritize vulnerabilities, and pick the right security tools to support the process
  • Describe the differences between managing network access for internal vs. third-party vendors

About the speaker:
Mitchell Parker, MBA, CISSP, is the Executive Director of Information Security and Compliance at IU Health.  Mitch’s focus is on addressing the business needs of Information Security across the organization, contract and vendor management, risk management, and researching and developing security controls for emerging technologies.  In addition to his work at IU Health, Mitch speaks at multiple conferences and writes for multiple publications, including CSO, Healthcare IT News, Health Tech Magazine, HealthsystemCIO.com, and SecurityCurrent.  Mitch also contributed to Voices of Innovation, recently published by HIMSS, and wrote a textbook chapter on Healthcare Cybersecurity and Regulatory Requirements for a Healthcare Informatics textbook to be published this year.

Watch the webinar

close close