The Hidden Attack Surface: How Third-Party Risk Threatens Client Assets
Speakers:

Michael Berman

Clay Carter
You’ve invested heavily in cybersecurity. Your perimeter is fortified, endpoints are secured, and monitoring is always on. Yet research shows 60% of breaches originate from third-party vendors — the one attack surface your tools don’t fully control.
For wealth management firms, that’s more than a technical challenge. A vendor compromise can expose client portfolios, damage hard-earned trust, and put your firm’s reputation on the line.
This session is designed for CISOs and security leaders who are ready to move beyond compliance checklists and tackle the real risks hiding in vendor relationships. We’ll explore:
- The hidden third-party pathways attackers exploit.
- Lessons from real-world breaches that disrupted financial services firms through vendor weaknesses.
- How to integrate third-party risk into your existing program so it strengthens security rather than creating busywork.
- Practical steps to lighten your workload, including vendor risk assessments that align with your workflows, monitoring strategies, and incident response plans for vendor-originated threats.
You’ll also gain:
- A vendor risk assessment framework you can adopt
immediately - Sample contract requirements to shift responsibility where it belongs
- Monitoring strategies designed to reduce—not add to—your workload
Bottom line: A mature third-party risk program isn’t just about compliance. It’s about protecting client assets, preserving trust, and ensuring your firm’s security investments deliver real protection.
Don’t let a vendor become your weakest link.
Register now to learn how leading CISOs are making third-party risk manageable.