Toolkit

Toolkit: Third-Party Risk Management

    Innovation, disruption, and digital transformation will further complicate the already complex cybersecurity landscape. Innovation will require new partnerships with third-parties in order to deliver new-in-kind interactions and services capabilities. These interactions increase a system's cybersecurity risk profile.

    Third-party risk management is not a one-time process; rather it is a cycle of conversations, risk assessments, adjustments, and internal discussions. But a thorough program does not have to be difficult. Use the checklist and sample catalog featured below to kick-start your program or assess your current approach to third-party risk management.

    Log in to access this content

    Log in

    Don't have an account? Learn about membership benefits

    Have a Question?

    x

    Ask our experts a question on any topic in health care by visiting our member portal, AskAdvisory.

    X
    Cookies help us improve your website experience. By using our website, you agree to our use of cookies.