This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Cybersecurity leaders Karen Habercoss, Chief Privacy Officer at the University of Chicago Medicine; Ashley Huntington, Compliance Officer and Interim Privacy Officer at Cook County Health; and Shefali Mookencherry, Chief Information Security Officer (CISO) and System Director of Information Security at Edward-Elmhurst Health discuss the importance of third-party vendor risk management.
MVSP, or Minimum Viable Secure Product, is a baseline created by industry leaders to ensure the security of third-party solutions. Learn more about this risk management strategy here.
As enterprise organizations incorporate more Software as a Service (SaaS), security leaders need to vet potential third-party vendors to assess their cyber risk.
Cybersecurity executive Neda Pitt has been appointed the new Chief Information Security Officer (CISO) at Globality, a vendor sourcing platform for enterprise organizations.
Security professionals engage with multiple issues to best secure their businesses. A risk management provider can help security leaders deal with third-party risk.
Third-party software can open your organization up to security risks. Learn how to ensure the third-party software at your organization is stable and secure.
As the person in charge of your healthcare organization’s information technology, one of your responsibilities is protecting patients’ and clients’ information. This can be difficult because third-party vendors with whom you contract can unwittingly jeopardize the security of that information. But you can take steps today to help prevent those problems tomorrow.