
By BJ Gardner, IT Director
When I started my career at Pennsylvania Lumbermens Mutual Insurance Company 20 years ago, managing technology and cyber risk was relatively contained to internal data management and physical data centers. The common practice across industries was to handle systems internally, as data stayed within the four walls of the organization. During that time, vendors had limited access to data and their roles were clearly defined.
Fast forward to modern day and that world no longer exists.
Today, the lumber and building material businesses rely heavily on cloud platforms, software as a service (SaaS) tools and outsourced technology providers. While these solutions bring efficiency and scalability, they also introduce the challenge of third, fourth and fifth party cyber risk.
In short, cyber risks do not just stop with the immediate vendors with whom you work. Your third-party vendors often rely on their own providers to deliver services. This is where the risk can quietly, and quickly, multiply.
At its core, fourth and fifth party risks are about visibility. Business leaders have to understand where their data is being stored, who can access it and how it’s being used. If you’re unaware of which vendors, beyond your direct partners, are touching your data, you can’t fully protect it. I often say, “you can’t secure what you don’t know exists.” This applies to vendor relationships as much as it does to technology.
Strong vendor management starts with consistent best practices, including:
- Thorough vetting during onboarding, such as security questionnaires and reviews of SOC 2 reports, or third-party audits of an organization’s system and organization controls, to understand how data is being protected.
- Clear communications and expectations, including requiring vendors to disclose whether additional parties may access your data.
- Contract-driven accountability, with defined security requirements, breach notification timeline and responsibility for downstream vendors.
- Consulting an insurance professional who understands cyber risks to evaluate your business’s vendor management processes and identify potential weak points.
If a cyber incident occurs at a fourth or fifth party, the responsibility to manage that relationship rests with your contracted third-party vendor. However, your organization still needs to be ready to act. This means isolating systems, resetting credentials and activating an incident response plan quickly to limit operational and reputational impact.
As technology changes, cyber risk will continue to evolve. For leaders in the lumber and building materials industry, the goal isn’t to avoid vendors. Rather, it’s to manage those vendors thoughtfully and strategically. By thinking beyond direct partners and asking better questions, companies can reduce risk and build resilience in an increasingly connected digital landscape.
Lumber Memo: Issue 1 – 2026
IN THIS ISSUE:
- Executive Commentary
- Hazards Around the Corner: Premise Liability & The Cost of Injury
- The Importance of Insuring Equipment to Value
- Understanding Fourth and Fifth Party Risk in a New Cyber Reality
- How Telematics Can Protect Drivers on and off the Road
- Spotlight On: Loss Control Survey Updates
- Spotlight On: PLM Award Winners
- Spotlight On: Upcoming Events
-
-



