The introduction of technology into the healthcare space reduces some risks to patients but also introduces new technology-related risks that must be managed. This chapter described the five iterative steps involved in managing risk:
1. Identifying risks
2. Assessing and prioritizing risks
3. Planning mitigations and assigning ownership for mitigation activities
4. Tracking mitigation progress and residual risk posture
5. Documenting and communicating with internal and external stakeholders
This chapter also examined the differences between security, privacy, application and data criticality, and safety risk assessment and explored the techniques used to manage risk in these specific domains.
To test your comprehension ...