Episode 87 — Supply Chain and Third-Party Risk

Every organization depends on vendors and partners, and this episode examines how that dependency creates new exposure. You’ll learn how software and hardware supply chains can be compromised through tampered updates, vulnerable components, or insecure integrations. The discussion clarifies how third-party risk management programs assess and monitor vendors through questionnaires, attestations, and continuous security ratings. We explore why trust must be earned and re-evaluated, not assumed, and how frameworks like NIST 800-161 and ISO 27036 formalize this discipline.
Listeners will also learn how contract clauses, right-to-audit provisions, and clear data-handling expectations enforce accountability beyond internal boundaries. The episode covers real-world examples of supply chain attacks that exploited overpermissive trust relationships, showing how transparency and verification could have mitigated damage. You’ll come away understanding that third-party risk management is a living process—one that strengthens resilience across ecosystems and aligns directly with GSEC exam objectives on governance, procurement, and assurance. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 87 — Supply Chain and Third-Party Risk
Broadcast by