Antares
All insights
Governance, Risk & ComplianceOctober 8, 2025·6 min read

Third-Party and Supply Chain Risk: What Mid-Market Organizations Need to Address Now

The most common entry point for sophisticated cyberattacks isn't a direct assault on the target. It's a vendor or third-party system with privileged access — and most vendor management programs weren't designed to assess that exposure.

The most common entry point for sophisticated cyberattacks isn't a direct assault on the target organization. It's a vendor, contractor, or third-party system with privileged access to the target's environment.

Supply chain attacks — where an adversary compromises a trusted third party to reach its actual target — have been among the most damaging incidents of the past several years. The organizations affected weren't necessarily running weak security programs. They were trusting vendors whose security posture they hadn't adequately evaluated.

Why Third-Party Risk Is Harder Than It Looks

Most organizations have some form of vendor review process. The challenge is that traditional vendor management was designed around operational and financial risk — delivery capability, financial stability, contract terms. Cybersecurity risk requires a different evaluation framework, and most vendor management programs haven't caught up.

The specific problem: when sensitive data or privileged access is shared with a vendor, the organization loses direct control over how that data or access is protected. The organization's security program is effectively only as strong as the weakest vendor with access to its most sensitive systems.

For mid-market organizations in financial services, healthcare, and professional services — industries that routinely share sensitive client data with vendors — this is a material and undermanaged exposure.

What a Functional Third-Party Risk Program Covers

Vendor inventory: A complete, current inventory of all vendors with access to organizational systems, data, or networks. This sounds basic. Most organizations don't have it.

Risk tiering: Not all vendors carry equal risk. A vendor with access to production systems and sensitive data warrants more rigorous evaluation than an office supply vendor. Risk tiering allows organizations to apply proportionate scrutiny.

Security assessment: For high-risk vendors, a security questionnaire or SOC 2 report review is a starting point — not a comprehensive evaluation. Understand what access the vendor has, what controls they have in place, and how they would respond to an incident that involves your data.

Contractual protections: Vendor contracts should include security requirements, breach notification obligations, audit rights, and data handling requirements. These provisions need to be in place before an incident, not negotiated during one.

Ongoing monitoring: Vendor risk isn't a one-time assessment. Vendors change — ownership, technology, personnel, security posture. High-risk vendors should be reviewed on a defined cadence.

Regulatory Context

Third-party risk management is explicitly addressed in most major regulatory frameworks. HIPAA requires covered entities to execute Business Associate Agreements with vendors that handle protected health information. GLBA requires financial institutions to oversee service provider arrangements. The SEC's cybersecurity disclosure rules include third-party risk as a material risk factor.

Regulators increasingly expect organizations to demonstrate that vendor risk management is active and documented — not just represented by a contract signed at onboarding.

Where to Start

If your organization doesn't have a current vendor inventory, that's the starting point. Build the list, tier the risk, and prioritize the vendors with the highest access and the least visibility. The goal isn't a perfect program on day one — it's a structured approach that you can mature over time.

Third-party risk is one of the highest-impact areas where a structured security program delivers value that point-in-time assessments and technology tools can't replicate.

About the author
Branden Rowe, Founder and Managing Director of Antares Security

Branden Rowe

Founder & Managing Director, Antares Security

Branden Rowe is the Founder and Managing Director of Antares Security, a cybersecurity advisory practice focused on governance, operational security, risk management, and executive-level security leadership. His career spans security and risk leadership across regulated and enterprise environments including Northern Trust, Baker Tilly, Wolters Kluwer, and Cushman & Wakefield.

Need a senior advisory perspective on your security program?

A 30–45 minute advisory call covers operating context, current posture, and the decisions forcing the work. If a fit exists, we propose scope.