How to Better Manage and Control Your Third-Party Risk

Logo
Presented by

John Houston at UPMC, Thomas August at John Muir Health, and Taylor Lehman at Wellforce

About this talk

Healthcare data privacy and security is one of the top challenges healthcare organizations face, and it’s clear that properly managing one’s users is a critical element to any successful cybersecurity strategy. While an organization might maintain control over its employees, third-party vendors come and go—leaving an enterprise open to significant risk. What’s worse is that some organizations don’t even know that it’s a problem. To this end, this webinar will take a deep dive into third-party risk management as it relates to identity and access management (IAM) and privileged access management (PAM). Download this webinar to learn how to identify vendor privileged access risks while discussing best practices to mitigate them from three leading healthcare cybersecurity experts. These industry leaders will share their learnings and explore best practices around enterprise-wide strategies for alleviating these risks, describing in-depth how having decided controls in place for third-party access can be a cybersecurity game-changer.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (62)
Subscribers (1789)
Over the past two decades, we have become the leading experts in critical access management for highly regulated enterprise organizations, technology vendors, healthcare providers, and more. Organizations of varying industries and needs continue to depend on SecureLink to secure access to their critical systems, data, IT and OT infrastructure, regulated information, and networks. Our value is more than world-class products — it’s our partnerships with every organization we work with. We understand technology, security, industries, and the vast cyber threats our customers face. We’re here to stand beside them and keep them secure.