3rd Party Risk Management
,
Application Security
,
Governance & Risk Management
CEO Jim Rosenthal on Improving Visibility, Remediation for Embedded Software Flaws
Third-party connectivity is now one of the primary sources of successful cyberattacks, meaning firms must secure their digital supply chains, said BlueVoyant CEO Jim Rosenthal.
See Also: Merging Without Mayhem: PAM Strategies that Work
Supply chain defense must go beyond passive monitoring, he said, actively identifying vulnerabilities and initiating contact with the responsible individuals inside third-party organizations to fix those issues. Finding the right contact – typically someone in the CISO’s chain of command rather than a procurement manager – is one of the most difficult but essential parts of third-party risk mitigation, Rosenthal said (see: How BlueVoyant’s Cyber Defense Platform Reduces Cyber Risk).
“What we’ve discovered with third-party defense is that often the first and most critical step is to identify who in the third-party is the right person to get to, to say, ‘It’s your responsibility. Here’s the problem. And here’s how to fix it,'” Rosenthal said. “Because our clients often know the third-parties through their purchasing organizations, and their purchasing organizations are not the right place.”
In this video interview with Information Security Media Group, Rosenthal also discussed:
- How SBOM integration offers enhanced visibility into embedded software components;
- How AI propelled the transition from targeted to mass-scale vulnerability exploitation;
- The most significant growth opportunities in third-party risk management.
Rosenthal, who co-founded BlueVoyant in 2017, spent the previous six years as chief operating officer at Morgan Stanley, where he reported to the CEO and the board on cybersecurity. He is the co-chairman of Sheltered Harbor, a consortium of major banks, securities firms, industry associations and technology service providers with the mission of preserving systemic confidence in the event of a cyberattack.

