CHIME College Live: Transforming Cybersecurity with a Strategic Vendor and Supply Chain Risk Management Program

CHIME Logo with Description

Guest Speakers:

James Noga Mass General Brigham James Noga, Chief Information Officer, Mass General Brigham
Joel Vengco Baystate Health Joel Vengco, SVP & Chief Information and Digital Officer, Baystate Health
Aaron Miri Dell Medical School UT Health Aaron Miri, CIO, Dell Medical School & UT Health

The rapid adoption of third-party vendors to drive digital health and other key initiatives has resulted in exponential risk to the health system. Transforming vendor risk management enables healthcare organizations to deliver safe, compliant, and highly-performant third-party outcomes throughout the vendor relationship lifecycle.

Censinet CEO and Founder Ed Gaudet will lead a panel discussion with healthcare CISOs on how to build an effective vendor risk management program. We will discuss how CISOs and their teams can radically transform the way in which they manage third-party relationships, automating much of the work and leveraging collective intelligence from across our network to help get ahead of risk.  We will discuss how automation enables health systems to coordinate and collaborate more efficiently to identify, remediate, and predict risk, with powerful visibility, insight, and decision-making capabilities.

3 Learning Objectives:

  1. Learn how to develop vendor risk strategies and programs that deliver transformative outcomes
  2. Learn best practices that create more efficient collaboration and visibility around the vendor risk process
  3. Understand risk management technology options and learn how automation enables health systems to identify, remediate, and predict risk.

More Censinet News

Digital Marketing Manager

Censinet is the leading provider of healthcare IT risk solutions. Censinet RiskOps, our software-as-a-service platform, helps the top healthcare providers in the United States work with their worldwide vendor and supplier community to ensure that health information is protected and continuous... READ MORE
Healthcare Investments Image

Investing in Healthcare Cybersecurity in 2022

As 2021 comes to an end, Healthcare IT leaders begin to prepare and discuss their organization’s investment plans for the upcoming year. As an industry, the increasing number of healthcare data breaches and cyberattacks have (1) highlighted the need for better patient, data, and supply chain... READ MORE

Log4j: Meet the new zero-day, same as the old zero-day

What is the Log4j issue? The Apache Log4j 2 utility is a commonly used service component for logging requests for audit and review purposes. Log4J, written in Java, supports many projects, including multiple cloud services and various open-source and commercial enterprise products.  On December 9,... READ MORE

Discover What You Can Do

Discover What You Can Do

Let's chat about your priorities, what your process is like today, areas that you want to improve, and any gaps you would like to close. Learn More