The Hitchhiker’s Guide to IT: Vendor Management and Cybersecurity

Cybersecurity has many facets, and not everyone is familiar with the ins and outs of it. What’s more, it may surprise people to learn that much of cybersecurity does not directly involve technology. As tech advances, new ways to address cybersecurity needs with the help of vendor management emerges. How do these advancements come together and help the world of cybersecurity?

On this episode of The Hitchhiker’s Guide to IT, host Michelle Dawn Mooney talks with Thomas Johnson, National Leader of Cybersecurity at BDO Digital, about vendors and cybersecurity. Johnson admits, “I’m accused of talking about cybersecurity that has nothing to do with technology”, which includes his college teaching job, where he teaches non-technical things like “making sure that people don’t click on links”. But he says non-technical aspects are important in the cyber community.

Mooney and Johnson also talk about:

  1. How you should not put everything in cybersecurity on the vendors
  2. Staying responsible as a consumer and IT provider
  3. Understanding and learning to work with the cloud

On the topic of vendor management, Johnson said, “I think it’s a super critical component, especially when organizations are looking at migrating workloads to The Cloud or using a service provider to be able to provide services, IT services, to the organization.” Johnson also warns not to rely solely on the vendors and promotes a responsible way of using vendors. He knows it can be tempting to leave everything up to vendors, but just like not clicking on links, being responsible is a non-technical component to cybersecurity that is just as vital to the job.

Thomas Johnson has worked in the technology field for over three decades, going from Information Technology Manager at MB Financial, to VP/Managing Director at Aqueity, to most recently being the National Leader in Cybersecurity at BDO Digital.

Recent Episodes

As organizations face increasing pressure to streamline operations and secure access to sensitive facilities, identity management solutions are becoming a critical focus in the physical security space. While traditional access control handles the “how” of gaining entry, identity management tackles the “who” and “why” — automating the full lifecycle of identity onboarding, change requests, and…

In a world where global supply chains are often fragile and reactive, AMAG Technology is taking a bold stance with a proactive, end-to-end approach. Total supply chain ownership—controlling everything from component sourcing to final product delivery—isn’t just a buzzword; it’s a lifeline in a volatile global market. With disruptions ranging from geopolitical tensions to material…

As the physical security landscape continues to evolve, system integrators find themselves at the intersection of rapid technological innovation and ever-growing client demands. Artificial intelligence and machine learning are no longer distant concepts—they’re becoming standard components of modern security solutions, from predictive threat detection to real-time analytics. At the same time, the growing adoption of…