Vendor Risk Management – Series 1

Test Subheading Test Subheading Test Subheading

You already assess your vendors operationally and financially  i.e. “are they going to do their job”, but have you thought about evaluating them based their cybersecurity posture. You already assess your vendors operationally and financially  i.e. “are they going to do their job”, but have you thought about evaluating them based their cybersecurity posture. You already assess your vendors operationally and financially  i.e. “are they going to do their job”, but have you thought about evaluating them based their cybersecurity posture. You already assess your vendors operationally and financially  i.e. “are they going to do their job”, but have you thought about evaluating them based their cybersecurity posture. 

What are the Possible Impacts?

  • Data you send to vendor gets compromised / leaked
  • Ransomware 
  • Entry point into your network 
  • Image / Reputational risk 
  • Strategic Risk 
  • Operational Risk  
  • Compliance Risk  
  • Legal Risk 

Vendor Risk Management with the Cybercoach

Ransomware Channel 9 Interview

Want to learn more?

The medical industry isn’t just Doctors. In this case study, we profile a benefits management company retained by GoldSky Security that collects, stores, and transmits electronic protected health information (ePHI). To issue life insurance, this company was required to broker healthcare information between patients, doctors, and insurance providers, thus placing them in-scope for HIPAA compliance. GoldSky performed a Security Risk Assessment (required under HIPAA) and was able to provide actionable and affordable security solutions to both comply with federal law, as well as protect patient data.

Read the Case Study

Goldsky helped implement a vendor risk management process.

Contact Us

Contact a Goldsky for a free consultation on Vendor Risk Management.

Healthcare Blog

  • Mitigating Supply Chain Risks Associated With COVID-19 Vaccine Distribution

    COVID-19 related restrictions and concerns repatriated business operations online for the foreseeable future; the need for a viable COVID vaccine is critical for normalcy. The development and distribution of said vaccine have captured the attention of nation-state cyber threat actors, who aim to disrupt the financial and political advantages associated with a viable vaccine. For

  • The Current State of U.S. Privacy Laws and Expectations for 2021

    With an executive administration change looming in Washington, the U.S. government is poised to continue with an uncompromising stance towards consumer privacy and security. The comprehensive privacy statutes that already exist may define a watershed moment for U.S. privacy laws in 2021, especially as it relates to the implementation of emerging technologies. As digital transformation

  • Can a Virtual Chief Information Security Officer (VCISO) Add Value To Your Bottom Line?

    With COVID-19 lasting longer than expected, organizations are rapidly undergoing digital transformation. This rapid digitization of key business operations and an increased remote workforce has introduced new cybersecurity risks and widened corporate attack surfaces. As such, having a VCISO is critical to ensuring that remote business operations are in-line with cybersecurity compliance requirements evolving digital

  • Latest Update on DoD’s CMMC Program – The Interim Rule

    By:  Ron Frechette, The Cyber Coach The twists continue to turn for Federal DoD Prime and Sub-Contractors related to the latest update on the adoption of the Cybersecurity Maturity Model Certification (CMMC) program. On September 29, 2020, the Defense Acquisitions Regulation System, DoD issued an Interim Rule that appears to be serving as a bridge

Are you evaluating your 3rd party vendors for Cyber-Risk?

[sg_popup id=”3047″ event=”click”]Click me[/sg_popup]