Third-Party Risk Management: SOC 2s, Security Questionnaires, and Psychosis
This talk analyzes the systemic inefficiencies and security theater inherent in traditional third-party risk management (TPRM) processes, specifically focusing on the misuse of SOC 2 reports and security questionnaires. It highlights how these documents are often treated as 'check-the-box' compliance exercises rather than meaningful security assessments, leading to information overload and unreliable risk data. The speaker provides actionable strategies for security professionals to integrate TPRM into broader business workflows, leverage AI for document review, and establish clear, risk-based requirements for vendors.
Beyond the SOC 2: Why Your Vendor Risk Assessment Is Just Security Theater
TLDR: Third-party risk management (TPRM) has devolved into a cycle of "check-the-box" compliance that provides a false sense of security while wasting massive amounts of engineering time. Instead of relying on static, outdated SOC 2 reports or generic security questionnaires, security teams should integrate risk assessments directly into procurement and development workflows. By treating vendor risk as a dynamic, context-specific problem rather than a static document review, you can actually identify real supply chain threats before they become your next incident.
Security teams are currently drowning in a sea of PDFs. Every time a business unit wants to onboard a new SaaS tool, the security team triggers a ritual: send a 200-question spreadsheet, wait three weeks for a vendor to fill it out with "N/A" or "See attached SOC 2," and then file the result in a folder that nobody ever opens again. This is not risk management. This is administrative busywork that creates a massive blind spot for actual supply chain attacks.
The Illusion of the SOC 2
SOC 2 reports have become the industry standard for "trust," but they are fundamentally flawed as a security assessment tool. A SOC 2 is a point-in-time snapshot of a vendor's internal controls. It tells you that the vendor has a process for managing access, but it does not tell you if that process is actually effective against the specific threat model of your integration.
When a vendor hands you a SOC 2, they are essentially saying, "We have a policy for this." They are not saying, "We are secure." As a researcher or pentester, you know that a policy is only as good as its implementation. Relying on these reports allows vendors to perform "security theater," where they present a polished, audited document to mask the fact that their actual security posture might be nonexistent or poorly configured.
Why Questionnaires Fail
Security questionnaires are the second pillar of this broken system. They are almost always generic, static, and disconnected from the actual technical implementation of the service. If you are assessing a vendor that provides a simple API integration, why are you asking them about their physical data center security or their employee background check policies?
The real risk lies in the technical implementation: How is the data encrypted in transit? What are the specific scopes of the OAuth tokens being requested? Does the vendor have a mechanism for T1199: Trusted Relationship exploitation? These are the questions that matter, yet they are rarely found in the standard, 300-row Excel templates that procurement teams force vendors to complete.
Integrating Risk into the Workflow
If you want to move away from this cycle of psychosis, you have to stop treating TPRM as a separate, siloed process. It needs to be embedded into the way your company already builds and buys software.
Start by identifying the "inherent risk" of a vendor based on the data they touch. If a vendor is just a project management tool with no access to sensitive customer data, your assessment should be lightweight. If they are a payment processor or a core infrastructure provider, they deserve a deep-dive technical review.
Instead of manual document review, use LLMs like ChatGPT or Claude to parse vendor documentation and security whitepapers. You can feed these tools your internal security requirements and ask them to flag discrepancies. For example, you can ask an LLM to compare a vendor's API documentation against your internal standards for authentication and authorization. This doesn't replace a human, but it turns a three-week manual review into a three-hour technical validation.
Moving Toward Continuous Monitoring
The most dangerous assumption in security is that a vendor is secure because they were secure six months ago. You need to shift toward continuous monitoring. This doesn't mean buying a "security rating" tool that scans random IP addresses and gives you an arbitrary "A-F" grade. Those tools are often just another form of security theater.
Instead, focus on the integrations themselves. If you are using a third-party service, monitor the traffic. If you are using an OAuth-based integration, audit the permissions regularly. If a vendor changes their API or their data handling practices, that should trigger a re-assessment automatically.
Practical Steps for the Technical Team
If you are a pentester or a security engineer, you have the power to change this. Stop accepting "we have a SOC 2" as an answer. When you are involved in a vendor review, ask for the technical architecture. Ask for the specific security controls that protect your data. If they cannot explain how they handle your data at a technical level, that is a red flag.
Create a "Security Addendum" for your contracts. This is a set of non-negotiable security requirements that you attach to every vendor agreement. It forces the vendor to commit to specific security outcomes—like timely incident reporting or adherence to specific encryption standards—rather than just promising to follow their own internal policies.
Ultimately, your goal is to reduce the noise. By focusing on the vendors that actually pose a risk to your infrastructure and automating the assessment of the rest, you can stop being a document-processing machine and start being a security engineer. The next time a business unit asks you to approve a new vendor, don't just send them a spreadsheet. Ask them what the vendor is actually doing, and then go look at the technical reality of that integration. That is where the real security work happens.
Vulnerability Classes
Target Technologies
Attack Techniques
Up Next From This Conference
Similar Talks

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

Counter Deception: Defending Yourself in a World Full of Lies




