Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity NewsGovernment: Federal, State and LocalTransportation/Logistics/Supply Chain/Distribution/ WarehousingEnterprise Services

5 minutes with Jonathan Ehret – The need for third-party risk management in cybersecurity

By Maria Henriquez
5 mins with Ehret
March 22, 2021

The SolarWinds hack is a strong reminder why third-party risk management is so important. Not only was SolarWinds breached, but the hack is now believed to have affected upward of 250 federal agencies and businesses.

Here, we speak to Jonathan Ehret, Vice President of Strategy & Risk at RiskRecon, who believes organizations should be asking their vendors about the third-party risk management and cybersecurity policies they have in place to protect against a breach and leak of critical data. 

 

Security: What is your background and current role?

Ehret: I am currently Vice President of Strategy & Risk at RiskRecon. RiskRecon provides cybersecurity ratings and insights that make it easy for enterprises to understand and act on their third-party cyber risks. Prior to coming RiskRecon, I was a 16-year practitioner in the Third-Party Risk Management (TPRM) and audit space. That time included significant stints with the TPRM programs of two major international banks.  Most recently I built and ran the TPRM function for one of the BlueCross BlueShield companies. At the same time, I was also President and Co-founder of the Third Party Risk Association, a non-profit professional association of third-party risk practitioners and vendors.

 

Security: What are some of the current challenges in trends in the third-party risk management space?

Ehret: The current challenges in third-party risk are largely the challenges that have existed for some time.  Teams are understaffed for the most part and are asked to tackle an ever-expanding universe of vendors. We talked with 150+ programs in 2020 and 87% of them felt that at some point, they were not staffed to adequately address the volume of new reviews and episodic re-assessments. Organizations have spent millions of dollars and countless FTEs securing internal networks, but then are giving the same data they are protecting internally to countless vendors with little to no idea of the security controls in place to protect that data.

 

Security: How did the SolarWinds attack raise awareness of the need for third-party cybersecurity from the board down?

Ehret: I think the SolarWinds attack forced organizations to re-think the scope of their third-party risk programs. For the most part before, programs largely were concerned with data that was being shared with third parties. SolarWinds changed the paradigm by forcing us to take the trust but verify mentality and apply it to the software running on-prem, particularly for software that might run with elevated privileges. The fact that it was a major national news story for several weeks helped highlight, for all levels of business leadership, the need for comprehensive and current understanding of the security postures of companies they do business with.

 

Security: What are some tips on what security teams can do to take control of TPRM cybersecurity (for beginners) or strengthen their program (for experienced teams)?

Ehret: My tip for programs just starting out is to not get discouraged. You are likely trying to shoe-horn a TPRM process into an existing procurement process that never knew it needed you. And that is going to slow things down. I always said my role in building out a TPRM program was 50% security-related and 50% salesman. And once you get the cooperation in place for you to get moving, never stop looking for vendors. Even with a robust vendor management program feeding vendors to you, you will always find vendors (paid and free) that nobody knows about.

For the mature teams, my suggestion would be to not stop at the yearly security questionnaire and the evidence that comes along with it. While that is no doubt a valuable piece of the TPRM process, if you want to build a mature program build it like a Swiss Army knife. In addition to the questionnaire, utilize tools like continuous monitoring products to build more comprehensive view of your vendor's posture at any given time. While questionnaires have their place, they are only point in time views into your vendor, a view in which the vendor can highly shape the perception of reality. Having additional tools in your Swiss Army knife can also be useful in situations where one tool may not be available to you, such as when you have an uncooperative vendor that will not respond to questionnaires or provide other attestations.

And for both groups, get involved. Network with your peers and learn from there. Likewise, share your experiences and help others improve their programs. At the end of the day, many of us are using common vendors. So it is in the best interests of everyone involved for our vendors to be as secure as possible. It is very much a “rising tide raises all ships” scenario.

 

Security: Could the pandemic have impacted and caused serious missteps as it relates to third-party risk and meeting proper compliance/governance requirements?

Ehret: Absolutely. As with all aspects of daily life, the pandemic had a profound impact on the world of third-party risk. Organizations were forced to take on new levels of risk that perhaps they previously were not comfortable with just to keep operations moving. 

For instance, many companies utilizing vendors offshore had specific requirements in place around the security of the workplace. In many cases, this meant secured office space, no cell phones, etc. When quarantines hit, and offshore staff could no longer get to the secured office spaces, organizations were forced to decide if they wanted to continue using that vendor without the previously agreed upon controls in place.

As the world's workforce moved remote, organizations that did not have remote access solutions in place were forced to implement one quickly. In some cases, the solutions that were implemented were less ideal from a security standpoint. These "leaky" remote access solutions now present the possibility that data you previously knew to be secure in their datacenter now has the potential to be resident on someone's home PC.

 

Security: Could you provide tips on how to ensure that the changes that were made as a result of the COVID-19 pandemic will not negatively impact the security posture of many organizations?

Ehret: I believe it is important for TPRM teams to not simply move forward and hope to catch any changes in the next episodic reassessment. Rather organizations should take stock of the new vendors that maybe did not get the proper level of due diligence in 2020 and make sure that they are assessed properly this year. For low-risk vendors that perhaps are not up for reassessment for another year or two, consider sending a much smaller assessment that might focus on things like remote access. On top of that, rely on the tools that you may have at your disposal, like your continuous monitoring platform, to help you identify vendors that might now be having some security challenges and add those to your review plan this year if they are not already a part of it.

KEYWORDS: cyber security risk management supply chain third-party cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Howlett

    5 minutes with Tony Howlett - Vendor risk management needs to be a top security priority in 2021 and beyond

    See More
  • 5 m with Shneider

    5 minutes with Tehila Shneider - Authorization policy management in the enterprise

    See More
  • 5mw Tim Danks

    5 minutes with Tim Danks - Global collaboration in cyber risk management is needed

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!