Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

3 steps for CISOs to ensure third-party vendor security

By Madeline Lauver
business software vendor
April 6, 2022

Organizational cybersecurity leaders manage countless risks on the job. While chief information security officers (CISOs) and other cyber stakeholders aim to mitigate and prevent security threats within their institutions, it is important to look closely at third-party vendors when deciding whether or not to enter into a partnership.

Security leaders discussed how to manage third-party cybersecurity risk at the Information Security Media Group (ISMG) Cybersecurity Summit, detailing the steps they've taken at their institutions to maintain data privacy compliance.

1. Vetting third-party software vendors

With the amount of cyber threats facing organizations today, it's important for CISOs to focus on what they can control. When Shefali Mookencherry, CISO and System Director of Information Security at Edward-Elmhurst Health, helped secure the organization during a recent merger, she focused on the importance of vetting third-party vendors. Using NIST standards, it can take between four to six weeks to ensure vendor cybersecurity, according to Mookencherry. 

"One of the things that we do control very strictly is our vendor supply chain management — looking at our vendor security, risk assessments and understanding what is it that the vendor is coming to us with," said Mookencherry. If the vendor doesn't meet an organization's security standards, "[CISOs] have the ability to say no — we have that control."

2. Increasing risk awareness organization-wide

Karen Habercoss, Chief Privacy Officer at the University of Chicago Medicine, believes that breaking down internal siloes can help reduce vendor risk. By having the security, privacy and legal departments communicate about vendors throughout the investigation and onboarding process, organizations can ensure that cybersecurity risks are mitigated by incorporating a variety of perspectives in discussions about the third-party vendor partnership.

"Privacy and security both are not often brought in organizationally from the beginning," said Habercoss. "So many times, we hear about initiatives after [they are] much further down the road, and we could have had a bigger impact. If we would have known sooner, we might have architected something differently or made comments about how policy might have happened."

3. Ongoing check-ins

The cybersecurity team's role doesn't end after vetting a third-party vendor. Ashley Huntington, Compliance Officer and Interim Privacy Officer at Cook County Health, spoke about the importance of continually checking in with vendor partnerships.

After screening and signing a contract with a new vendor, the solution's integration team began asking for unexpected data from Cook County Health. When a security team member flagged this activity and brought it up to the legal department, they were able to identify the issue as a matter of contract interpretation and, ultimately, protect the data of their users.

"It really was a case of the vendors, legal and operations teams not communicating it to their implementation team," said Huntington. "Communicating to the organization that if you really sense that something could be wrong — it doesn't matter if you're a product manager, a CISO or a privacy officer — if you sense that something might be wrong, it is okay to put the brakes on it and check in with your folks first."

KEYWORDS: compliance data privacy interdepartmental cooperation risk management supply chain management third-party cybersecurity vendor risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Madeline Lauver is a former Editor in Chief at Security magazine. Within her role at Security, Lauver focused on news articles, web exclusives, features and several departments for Security’s monthly digital edition, as well as managing social media and multimedia content.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • phishing

    4 Steps to Mitigating Third-Party Vendor Cybersecurity Threats

    See More
  • cybersecurity finger pointing

    3 ways AI can handle third-party vendor and supplier risk challenges

    See More
  • online shopping

    Bill Introduced to Ensure Transparency for Third-Party Sellers of Online Product Sales

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing