Toolkit: Third-Party Risk Management

    Innovation, disruption, and digital transformation will further complicate the already complex cybersecurity landscape. Innovation will require new partnerships with third-parties in order to deliver new-in-kind interactions and services capabilities. These interactions increase a system's cybersecurity risk profile.

    Third-party risk management is not a one-time process; rather it is a cycle of conversations, risk assessments, adjustments, and internal discussions. But a thorough program does not have to be difficult. Use the checklist and sample catalog featured below to kick-start your program or assess your current approach to third-party risk management.

    Log in to access this content

    Log in

    Don't have an account? Learn about membership benefits

    Have a Question?


    Ask our experts a question on any topic in health care by visiting our member portal, AskAdvisory.

    Cookies help us improve your website experience. By using our website, you agree to our use of cookies.