Addressing Vendor Risk Management Through Secured Access
Sponsored by: Securelink
SecureLink is the leader in managing vendor privileged access and remote support for both highly regulated enterprise organizations and technology vendors. SecureLink serves more than 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming, and retail rely on SecureLink’s secure, purpose-built platform. SecureLink is headquartered in Austin, Texas.
March 5th, 2019 1:00PM ET
Healthcare relies heavily upon its business associates and third-party vendors to ensure seamless transactions, bolster care quality, and other processes. Covered entities employ systems to support access to data. In doing so, vendors can actually increase risk to provider organizations when those access points and contractual relationships aren’t properly managed.
As healthcare has continued to be a prime target for hackers, as well, the use of those digital environments needs to be protected to ensure providers aren’t exposing their organization to HIPAA compliance issues, security incidents or even a breach of patient data.
As the Vice President of Assurance Strategy & Community Development for HITRUST, Mike Parisi has extensive experience with third-party assurance reporting, such as HITRUST readiness and certification, Agreed Upon Procedure, and customized AT-101 engagements. He’s led more than 500 controls-related engagements, primarily in the health and financial service industries. He also has several years of experience implementing large Oracle ERP systems, specializing in the General Ledger and Governance Risk and Compliance modules.
During this presentation, Parisi will outline the challenges of vendor risk management, while focusing on the benefits and drawbacks of various identity access methods. He’ll also highlight the increasing need for vendor privileged access management.
•Outlining the risks third-party vendors and business associates pose to health delivery organizations
•Identifying best practices for successfully building and assessing vendor risk management
•Detailing steps to implementing secure access for vendors, including contracting, privilege access management, and other security policies and tools
This webcast is approved for up to 1.0 continuing education (CE) hours for use in fulfilling the continuing education requirements of the Certified Professional in Healthcare Information & Management Systems (CPHIMS) and the Certified Associate in Healthcare Information & Management Systems (CAHIMS).