A Cybersecurity Game-Changer: How to Better Manage and Control Your Third-Party Risk

April 22, 2019
Join us for this two-part webinar series as we identify vendor privileged access risks while discussing best practices to mitigate them.
Secure Link Logo 5cb9fbaf59626

Healthcare data privacy and security is one of the top challenges healthcare organizations face, and it has now become clear that properly managing one’s users is a critical element in any successful cybersecurity strategy. Join us for this two-part webinar series as we identify vendor privileged access risks while discussing best practices to mitigate them.

While an organization might maintain control over its employees, third-party (non-employed) vendors come and go—leaving the enterprise open to significant risk. What’s worse is that some organizations don’t even know that it’s a problem. To this end, both webinars will take a deep dive into third-party risk management as it relates to identity and access management (IAM) and privileged access management (PAM).

In the first part of this webinar series, three leading healthcare cybersecurity experts—two of whom founded the Provider Third-Party Risk Management Council, and a third who has developed programs to address this issue within hospitals—will come together for a powerhouse panel discussion.

These industry leaders will share their learnings and explore best practices around enterprise-wide strategies for alleviating these risks, describing in-depth how having dedicated controls in place for third-party access can be a cybersecurity game-changer.

Please test your system for webcast compatibility by clicking here.

Presented by:

John Houston Vice President, Information Security and Privacy; Associated Council, UPMC
Taylor Lehmann Chief Information Security Officer at Wellforce
Thomas August VP & Chief Information Security Officer, John Muir Health