HCISPP

Course
Time
5 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:00
Hello again and welcome to the H d A I s p p certification course with Sai Buri
00:06
third party remediation efforts. My name is Shalane Hutchins and on your instructor
00:14
today we're gonna talk about risk management activities,
00:18
risk treatment, identification,
00:22
corrective action plans
00:24
and compliance activities. Documentation.
00:31
When a primary entity conducts a risk assessment or audit,
00:35
it needs to determine the risk level. Associate it with any findings.
00:40
For example, if physical security safeguards are found to be lax at a third party vendors processing facility,
00:48
the primary entity may determine this to be a critical risk to the sensitive data.
00:53
When the security incident occurs that results in breach the primary entity in third party vendor must each contribute information that allows for an appropriate assessment of the risk level.
01:07
The third party vendor needs to ensure that it relates the facts surrounding what occurred as well as a residual risks that remain.
01:15
The primary entity must determine the harm to the impacted individuals to determine what appropriate notification must include, as well as the overall financial and reputational harm.
01:30
If the incident is believed to have been caused by an illegal activities such as hacking
01:34
the primary entity, and the third party must bring in law enforcement.
01:44
Each finding door during a third party vendor assessment should be assigned a risk rating, such as critical, high, medium or low.
01:55
The primary entity needs to establish requirements at each of those levels.
02:00
For example,
02:01
it may be that a critical finding needs to be resolved in 14 days.
02:07
The third party vendor needs to understand that primary entity stance on risk acceptance,
02:14
perhaps Onley at certain lower risk rating levels.
02:19
How risk acceptance be agreed upon and documented
02:23
if the primary entity is not comfortable that a proposed remediation will mitigate the identified, A risk and risk acceptance is not appropriate. But primary entity needs to have an escalation process in place to determine whether or not it makes sense to continue doing business with the vendor.
02:42
Follow up time creams could also buried by risk. Rainy.
02:46
The primary entity may weren't weekly status updates for critical risks,
02:51
but will only need to follow up quarterly on medium risk findings
03:01
when issues have been identified and assigned a risk level. It's important for in information Security representative
03:08
to meet with the internal business owner and the vendors representative to discuss the issues and help of inter planes to address them.
03:17
The corrective action plan should indicate what the vendor plans to implement, for example, new technology or enhanced policies and procedures, or additional training
03:30
and the time frame in which the activity will be carried out.
03:35
In those instances where the vendor determines it cannot correct an issue,
03:39
it will be the decision of the primary entity. Whether it can accept that risk arena.
03:46
The decision will need to be made about the impact to the primary entity and if it makes sense to continue doing business, what the no risk
03:55
depending on the type of risk. This situation, which should be somewhat rare, will need to be escalated to senior management for a decision.
04:04
That is where the security professional can provide valuable information about the risk and what it poses for the organization. This should be communicated in business language that can be understood by all parties involved in the decision making process.
04:28
As noted earlier, it is a responsibility of the primary entity to assess the risk associated with engaging in a relationship with vendor.
04:38
The role of the security professional is to serve as the subject matter expert for assessing security risks,
04:46
which in turn equips the business owner with information to make informed decisions.
04:50
Again,
04:51
if the security professional has invested in equipping the internal business owner with knowledge tracking compliance activities can be incorporated into whatever process the business owner is using to track other metrics associated with the vendor. For example, operational S. L. A's
05:12
the internal business owner, could periodically validate that the vendor has informed the primary entity of those individuals who have been terminated by the by the vendor.
05:24
It's a good practice for the internal business owner to embed ongoing compliance questions into the operational monitoring, reporting what the primary entity, senior management and the third party vendor.
05:38
Tracking of issues not only shows progress on individual risks, but it also provides a repository of information that could be used to keep senior management informed and monitor trends.
05:55
So in summary, we talked about risk management activities, risk treatment, identification,
06:01
corrective action plans and compliance activities. Documentation.
06:06
Stay tuned for the next video

Up Next

HCISPP

The HCISSP certification course provides students with the knowledge and skills to successfully pass the certification test needed to become a healthcare information security and privacy practitioner. The course covers all seven domains included on the exam.

Instructed By

Instructor Profile Image
Schlaine Hutchins
Director, Information Security / Security Officer
Instructor