Announcing: What Lies Beneath – The Third-Party Risk Management Podcast

March 17, 2020
Harris Allgeier


The Podcast All About Risk

We recently launched our brand-new podcast “What Lies Beneath”

You may think you know who you’re connected to. But do you know who the people you’re connected with are connected with? What about your second, third, or fourth-tier connections? 

The truth is, we’re more dependent on one another than ever before. We depend on each other in unexpected and surprising ways that we’ve never before seen. You may be connected with someone that you don’t want to be, solely by association. 

That’s where “What Lies Beneath” comes in. There aren’t a lot of podcasts centered around 3rd party risk management. We’re looking to change that. We’ll talk to everyone from the CIO, down to the boots on the ground folks that are in the trenches day in and day out.

Every episode, Interos’ CEO and third-party risk expert Jennifer Bisceglie sits down with a new risk leader to discuss emerging trends, industry issues, and pioneering solutions to the most pressing problems facing risk professionals right now. From child labor to COVID-19, What Lies Beneath will touch on issues that affect businesses around the world. 

Unique Guests

In our first episode Jennifer was fortunate enought to interivew Mark Weatherford, Booking Holdings’ Global Information Security Strategist, covering topics including supply chain risk management in critical infrastructure, the changing role of the CISO in maanging third party risk, and more!


To listen to What Lies Beneath check us out and subscribe on Stitcher, Apple Podcasts, Google Play, Spotify, or wherever you listen to podcasts. If you like what you hear, please rate and review the show, or share it with a friend! New episodes air every other Tuesday.

To learn more about Interos, visit

View next

Ensure Operational Resilience

Request Contact

Build operational resiliency into your extended supply chain:

  • 889 compliance – ensure market access
  • Data sharing with 3rd parties and beyond – protect reputation
  • Concentration risk – ensure business continuity
  • Cyber breaches – assess potential exposure
  • Unethical labor – avoid reputational harm
  • On-boarding and monitoring suppliers – save time and money