Cloudanix Joins AWS ISV Accelerate Program

Navigating the Extended Ecosystem: A Strategic Guide to Third-Party Risk Management

The modern business environment is no longer contained within a single organization’s walls; it is an interconnected web of digital and physical dependencies. As businesses increasingly rely on external partners for everything from data processing to office supplies, the risks associated with these relationships have moved to the forefront of cybersecurity strategy.

We sat down with Jeffrey Wheatman, Cyber Risk Evangelist at BlackKite and former Gartner Analyst, to discuss the evolving challenges of Third-Party Risk Management (TPRM). With three decades of experience, Jeffrey shared his insights on why traditional security questionnaires are failing, how to communicate risk to business stakeholders, and the emerging importance of digital supply chain resilience.

You can read the complete transcript of the epiosde here >

What are the Key Differences Between Third-Party, Vendor, and Supply Chain Risk?

While often used interchangeably, Jeffrey clarifies that these three disciplines are interrelated but distinct in scope:

Cybersecurity is a critical slice of this ecosystem because it has an outsized impact on the business. A ransomware attack on a partner can halt your ability to manufacture, ship products, or collect payments.

Why are Traditional Security Questionnaires No Longer Sufficient?

Historically, organizations assessed third-party exposure by sending out questionnaires. However, this method faces several critical sustainability and accuracy challenges:

  • Accuracy Decay: Even if a questionnaire is 100% accurate the day it is filled out, it becomes less accurate every week, month, or year that passes as dynamic environments change.
  • Lack of Holistic Knowledge: It is rare to find one person in an organization who knows every moving part of their security and risk posture.
  • Self-Reporting Gaps: Questionnaires often rely on binary “yes/no” questions that hide nuance—such as having Multi-Factor Authentication (MFA) on “critical” systems only, rather than across the whole organization.
  • Policy vs. Practice: Often, what a CIO reports in a policy doesn’t match what engineers are actually doing on the ground (e.g., bypassing firewall change controls to maintain velocity).

Despite these flaws, questionnaires remain common because they fulfill due diligence requirements, provide some legal protection, and have simply “always been done that way”.

How Should Organizations Prioritize Their Third-Party Partners?

With many organizations dealing with thousands of partners, it is impossible to treat every vendor with the same level of scrutiny. Jeffrey suggests prioritizing based on business impact:

  • Impact Assessment: Determine how bad it would be if a partner were hit with ransomware. Would your business function at a lesser level, or not at all?
  • Data Sensitivity: Evaluate the risk if a partner loses your specific data, even in non-breach scenarios like privacy violations.
  • Extended Ecosystems: Look beyond the third party to fourth, fifth, and sixth-party risks. For example, concentration risk arises if all your partners use the same cloud provider (AWS, Google, or Azure).
  • Simple Categorization: Avoid overanalyzing; use three or four simple buckets—Critical, Important, and “Meh”—to determine what you will do differently for each group.

How Can Security Teams Effectively Communicate Risk to Stakeholders?

A recurring problem in risk management is the disconnect between technical data and business value. To fix this, Jeffrey recommends shifting the language used with business leaders:

  • Move Beyond Tech Specs: Instead of telling a business person that a vendor isn’t patching, explain the business consequence: “Based on what we’ve seen, it’s highly likely we see an incident in the next 12 months. If their system is unavailable for a week, how bad is that for you?”.
  • Outcome-Based Security: Work with executives to understand that security is a trade-off: more investment equals more risk mitigation. When budget is cut, the business must understand and articulate exactly what additional risk they are absorbing.
  • Accountability Alignment: Address the common scenario where a business chooses the cheapest security option against expert advice, yet the security person is still held accountable when a breach occurs.

What is the Value of Scenario Planning and Role-Reversal Workshops?

To build empathy and a common understanding of risk, Jeffrey advocates for intense scenario planning.

In these workshops, he recommends changing everyone’s job: the CIO becomes the COO, the CTO becomes the CEO, and so on. This forces participants to think differently about dependencies and security value, often leading to the realization of previously unthought-of risks. This interaction helps embed the CISO as an equal partner rather than a roadblock.

What Emerging Trends are Shaping the Future of Cyber Risk?

Several global trends are maturing the TPRM landscape:

  • Resilience over Compliance: Organizations are moving toward resilience—ensuring they can continue to operate regardless of the incident.
  • Real-Time Intelligence: The shift is moving from static data to real-time intelligence. Providing context is more valuable than just throwing out a “security score”.
  • Regulatory Pressure: Regulations like the SEC ruling in the US, DORA in the EU, and new accountability frameworks in India are forcing boards to take a more proactive role in cybersecurity oversight.
  • The AI Advantage: AI is beginning to provide sophisticated analysis for complex problems, such as the “traveling salesperson problem” in supply chain mapping, helping to identify vulnerabilities further down the chain.

Conclusion: Building a Defensible and Scalable Program

As Jeffrey Wheatman emphasizes, effective third-party risk management is not about achieving 100% accuracy—which is impossible—but about defensibility. Organizations must document their decision-making processes so that when bad things inevitably happen, they can explain to regulators why they took a specific course of action. By prioritizing vendors based on business impact, automating where possible to provide business context, and fostering a culture of “give and take” between security and the business, leaders can move from simply checking boxes to building a truly resilient extended enterprise.

Related Resources

Comprehensive cloud security platform covering code to cloud protection

Security for your Code, Cloud and Data

Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.

Get Started

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Wednesday, Nov 05, 2025

From Static to Strategic: Modernizing Privileged Access for Cloud Infrastructure

The promise of the cloud – agility, scalability, and innovation – has revolutionized how enterprises operate. Cloud infr

Read More

Tuesday, Sep 30, 2025

Eliminate Standing Access: Introducing JIT Kubernetes for Azure AKS Security

The Security Mandate: Why Permanent Access Fails Mission-Critical AKS Kubernetes has become the operating system of

Read More

Friday, Aug 08, 2025

User Access Review in Cloud Security: A Foundational Guide to Securing Your Cloud Environment

Introduction: The Unseen Gatekeepers of Cloud Security In the rapidly expanding landscape of cloud computing, organi

Read More