Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalPhysical SecurityTransportation/Logistics/Supply Chain/Distribution/ Warehousing

Special Report

Managing third-party risks in the supply chain

Secure supply chains depend on visibility and strong internal and vendor partnerships.

By Madeline Lauver
Supply chain

primeimages / via Getty Images

June 1, 2023

In an environment as dynamic as an enterprise supply chain, communication plays a key role in maintaining safety and security across a wide range of third parties. As the world becomes more interconnected and organizations rely on each other to produce goods, operate efficiently and serve their industries, risks present in one link of the supply chain can magnify and have global effects.

“One mistake or safety incident that comes up can result in disruptions in the supply chain,” says Rosalina Gadsden Acosta, experienced leader in supply chain security and compliance that has held multiple roles across Meta Platforms Inc., The Boeing Company and manufacturing sites in Mexico. Acosta started in supply chain on the logistics side, gaining hands-on experience in supply chain operations. She says that practical experience helped her realize the importance of visibility and awareness of each aspect of the enterprise supply chain.

Her introduction to supply chains through logistics operations helped Acosta in “noticing the importance of developing and maintaining policies, processes, operating manuals and trainings from a security perspective. If they’re not existent, that really could easily impact their production line processes and business objectives.”


Rosalina Gadsden Acosta

Rosalina Gadsden Acosta, supply chain security and compliance leader that has held multiple roles across Meta Platforms Inc., The Boeing Company and manufacturing sites in Mexico. Image courtesy of Acosta


Aligning vendors with business objectives is a critical supply chain security priority, according to Steven Palumbo, a seasoned corporate security executive who has held leadership roles including Senior Director, Security Operations at Bed Bath & Beyond and Tiffany & Co. Palumbo has worked to secure intricate supply chains across both retail organizations.

Palumbo learned to communicate the importance of vendor compliance at Tiffany & Co. when the organization transitioned from full ownership of their supply chain to a third-party logistics (3PL) model. At Tiffany & Co., “Those warehouses were full of valuable merchandise, so we had to have a very hard target mentality. We were able to control it, and then when we did go to the 3PL model overseas, we had to make sure that they understood the value of what they’re protecting for us.”


Steven Palumbo

Steven Palumbo, seasoned corporate security executive and former Senior Director, Security Operations at Bed Bath & Beyond and Tiffany & Co. Image courtesy of Palumbo


Assess vendor risk

Communicating with third-party vendors to develop a culture of security and compliance helps prevent incidents in the long term, according to Palumbo. Security executives who combine security culture, compliance and risk assessments can reduce the impact of supply chain security threats.

“With a 3PL, you are giving up some level of control. That’s your biggest risk. What I think you need to do to combat that is relate to them the importance of what they’re protecting,” Palumbo says.

Working in tandem with third parties can increase communication and give the enterprise security leader a better understanding of region-based risk. “Risks are going to vary by location. There are certain areas with higher security awareness than others,” says Palumbo.

To assess third-party risk in the supply chain, security leaders should first consider the priorities of their organization.

“You need to identify what is critical for the business and what is really a vulnerability in relation to that,” says Acosta. The assessment process involves “the strategic work of identifying the different categories of threats, understanding their regional threats and establishing intelligence practices as well,” she adds.

When identifying geographic threats, security leaders should identify potential security risks associated with operating in certain regions, including cargo theft, counterfeiting, smuggling, tampering and more. “That type of analysis brings awareness to the third parties that are going to greatly impact the company’s supply chain if something were to happen,” Acosta says.

Supply chain security professionals can look at a number of factors to determine the risk profile of their vendors in relation to business priorities. Once the location and business criticality has been determined, security leaders can use their risk assessments as a roadmap to aligning supply chain security with business priorities. Building a robust third-party risk management program requires strong relationships between security and each link in the supply chain.


Develop consistent security policies

For Acosta, a critical aspect of supply chain security is ensuring smooth and comprehensive processes at each stage of the chain, from individual vendors to the global scale. A breakdown in process at one facility can have wider ramifications, she says. “If we don’t have internal processes in place to protect organizational supply chains, incidents will impact the global supply chain at a larger scale.”

Supply chain security leaders should prioritize “working across global sites to align the different supply chain security processes based on local requirements and certifications that they have in every single region,” says Acosta.

Working across multiple regions and regulatory landscapes can be a challenge for supply chain security professionals. In developing global policies to protect supply chains, Palumbo advises an approach based in consistency. “Be consistent in how you’re explaining things, consistent in how you’re auditing, and consistent in how you’re holding third parties accountable,” says Palumbo.

A consistent approach to security helps set the groundwork of compliance across the supply chain, “but you’ve got to have a little bit of flexibility because you may run into those one-off situations where something could be a little different — the inability to fence in the yard for whatever reason, etc.,” Palumbo adds.


Collaborate for supply chain visibility

In addition to the emphasis on vendor communication, security leaders need to foster a culture of communication and teamwork within their own organizations to holistically support supply chains. “Understanding our supply chain helps security provide intelligence to our business partners so they can make decisions on selecting the best suppliers,” says Acosta.

“You’ve got to get buy-in from the other departments,” adds Palumbo. “When you’re working supply chain, you’re dealing with transportation, logistics, operations — you’ve got to make sure that they are in tune with what you’re doing because they’re the ones signing on the new 3PL company to get your merchandise. Often, you won’t find out about a new 3PL until it’s signed. Hopefully you’re being included, but it doesn’t always work that way, so the fact that your partners are on the same page as you and understand what you’re trying to accomplish — that’ll go a long way.”

Having each arm of the business unified under the same goals helps not only security, but the entire supply chain operate more efficiently to fulfill those operational priorities. As important as it is for security teams to be aligned with business objectives, it is also critical for other departments in the business to buy into security.

“We need to develop that security culture that demonstrates the shared responsibility across the supply chain,” Acosta says. “The way to establish a robust security foundation is to partner with diverse organizations in the company to understand what matters to each of them, what their scope is, and how all that connects with security practices to find that common ground and support each other.”

Without a reciprocal understanding of security and business priorities, supply chains are left open to risk. Even with a set of effective security policies, organizations and their third parties need to be on the same page about the importance of security to remain compliant.

KEYWORDS: logistics security policies supply chain Supply Chain Disruptions third-party risk third-party security vendor risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Madeline Lauver is a former Editor in Chief at Security magazine. Within her role at Security, Lauver focused on news articles, web exclusives, features and several departments for Security’s monthly digital edition, as well as managing social media and multimedia content.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Podcast- Welch.jpg

    Listen to Michael Welch and how to address fourth-party risks and improve supply chain security in our latest The Security Podcast episode

    See More
  • Supply chain cyber security third party risk

    Third-party security: The missing piece in the cybersecurity puzzle

    See More
  • 5 mins with Ehret

    5 minutes with Jonathan Ehret – The need for third-party risk management in cybersecurity

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!