Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Healthcare's SMART Toolkit for Third-Party Risk Management

Claroty
05/11/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • The Health Sector Coordinating Council released the SMART toolkit in October 2024, providing 17 workflow maps that visualize critical third-party dependencies across healthcare operations from claims processing to pharmaceutical manufacturing.
  • The toolkit enables organizations to assess material impact across clinical, financial, administrative, and regulatory dimensions, then prioritize risks based on market leverage and concentration factors.
  • Born from the Change Healthcare attack, SMART addresses a strategic objective to develop cross-sector third-party risk management strategies for supply chain and service provider cybersecurity risks.
  • The methodology is scalable for organizations of all sizes and designed as a living document that will evolve with industry feedback and technological changes, particularly as AI automation matures.
  • Over 460 healthcare organizations collaborated on the toolkit's development, representing providers, payers, technology vendors, and public health agencies in a sector-led approach to systemic risk visibility.

The SMART Toolkit: Mapping Healthcare's Critical Dependencies

The Health Sector Coordinating Council Cybersecurity Working Group has released the Sector Mapping and Risk Toolkit (SMART), a 16-month initiative born from the Change Healthcare attack in February 2024. The toolkit provides 17 workflow maps covering critical healthcare functions from blood supply distribution to claims processing, pharmaceutical manufacturing, and dialysis services. Each map visualizes the complex web of third-party dependencies that support daily healthcare operations, offering organizations a template to identify single points of failure and concentration risks. The toolkit is designed to be scalable, serving both large health systems with complex vendor ecosystems and smaller practices with simpler workflows. By making the invisible infrastructure visible, SMART enables healthcare organizations to understand where their critical dependencies lie and what would happen if those services were disrupted.

Materiality Assessment and Risk Prioritization

The toolkit introduces a structured approach to measuring material impact across clinical, administrative, financial, and regulatory dimensions. Organizations use the maps to assign relative risk ratings to third-party services based on factors including cybersecurity hygiene, market concentration, and geographic risk. This materiality framework helps healthcare entities prioritize where to invest in risk mitigation and where to focus on resilience planning. For services where organizations have market leverage, they can demand better security practices or switch providers. For concentrated markets where a single vendor controls 70-80% of the market, the focus shifts to right-of-boom preparedness — developing continuity plans, backup procedures, and manual override capabilities. The methodology acknowledges that not all risks can be mitigated, but all can be prepared for through awareness and planning.

Industry Collaboration and Future Evolution

The SMART toolkit represents a collaborative effort involving approximately 460 organizations across the healthcare spectrum, including providers, payers, medical technology companies, pharmaceutical manufacturers, and health IT firms. The working group deliberately excluded AI-driven workflows from the current version, recognizing that AI's role in healthcare automation is still maturing too rapidly to capture accurately. The toolkit is positioned as a living document that will evolve based on user feedback and industry changes. Early adopters have already begun implementing the maps, with one healthcare provider presenting lessons learned just six weeks after publication. The working group is actively seeking feedback on accuracy, usability, and implementation experiences to refine future versions. This sector-led approach mirrors similar critical infrastructure mapping efforts in financial services, where visualization of systemic dependencies helped government agencies understand where to focus preparedness and recovery resources.

Chapters

0:00 - Introduction and Podcast Overview
1:32 - Health Sector Coordinating Council Background
3:56 - Origins of the SMART Toolkit
7:07 - Development Process and Workflow Mapping
13:46 - Visual Impact and Plumbing Analogy
15:45 - Third-Party Risk Focus and Rationale
21:04 - Materiality Assessment Framework
23:48 - Scalability for Different Organization Sizes
27:40 - Early Feedback and Implementation
29:22 - Living Document and AI Considerations
32:01 - Future Roadmap and Government Role

Key Quotes

4:48 "Develop meaningful cross-sector third-party risk management strategies for evaluating, monitoring, and responding to supply chain and third-party provider cybersecurity risks."
6:56 "Let's rip up the floorboards and look at the plumbing and where are the loose joints? Where are the leaks in the plumbing that we need to fix? ..."
18:48 "Until such time that third party providers are held to a higher standard of cybersecurity because they are supporting the nation's critical infrastructure, you know, critical infrastructure means life and death."
27:36 "If you can't influence it, be prepared for it."
31:41 "AI has just rendered irrelevant what we wrote last week. I'm overstating that point, but that's kind of the idea."

Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Compliance & Governance
  • Best Practices
  • Technical Deep Dive
  • Threat Intelligence
  • Healthcare Cybersecurity
  • Third-Party Risk Management
  • Supply Chain Security
  • Critical Infrastructure Protection
  • Healthcare Workflow Mapping
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Healthcare's SMART Toolkit for Third-Party Risk Management

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights
                https://www.truthinit.com/index.php/channel/1895/transforming-perceptions-of-ai-risks-and-threats-through-data-lineage-insights/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Data Lineage: Revealing AI Risks and Hidden Threats
                https://www.truthinit.com/index.php/channel/1894/transforming-data-lineage-revealing-ai-risks-and-hidden-threats/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Harnessing AI: Transitioning from Illusion to Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Data Lineage: Revealing AI Risks and Hidden Threats

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version