COMMENTARY: One of the most talked-about moments at the RSA Conference (RSAC) this year wasn’t a product launch or a keynote. It was a letter.
Patrick Opet, chief information security officer of JP Morgan Chase, published an open letter to third-party suppliers on the first day of the conference.
[SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Read more Perspectives here.]
His message was blunt: Get your act together. Opet’s letter called out the lack of reliability, accountability, and transparency from too many cybersecurity and SaaS vendors. For many security leaders, it put words to a frustration that’s been simmering for years: we’re spending more than ever on tools, and yet we still can't answer basic questions during an incident.
The letter was more than a complaint — it was a call to arms. And judging by the conversations it sparked at RSAC and on LinkedIn, it hit a nerve.
Only 45% met baseline logging requirements, such as providing accessible API logs or distinguishing between human and machine activity. 30% lacked full API logging altogether, meaning some forms of access leave no trace. 40% failed to distinguish between human users and machine-to-machine integrations. Nearly 50% required additional licensing or manual support requests just to access security logs.
The data shows that it’s not just a compliance concern, but an operational one. When an API key gets compromised or an OAuth token gets used to exfiltrate sensitive customer data, most security teams are effectively blind. Logs may not exist, are often incomplete, or may misattribute actions to the wrong identity.
Ask SaaS vendors better questions: Don’t just ask if a SaaS platform offers logs. Ask if it logs all API requests, distinguishes between humans and machines, and allows token-level monitoring. Audit machine identities: Treat API keys and OAuth tokens as first-class citizens in the organization’s identity strategy. Know what sensitive data they access, rotate them frequently, and monitor their behavior. Operationalize AI deployments: AI lives on the same infrastructure, talks to the same APIs, and inherits the same vulnerabilities as everything else in your stack. We need to understand and monitor its data exposure, permissions, and downstream consequences. Push for transparency: Join the chorus. As buyers, we have leverage. Ask vendors for secure-by-default options, real-time visibility, better logging, and clear incident response protocols.
Patrick Opet’s letter didn’t just express frustration: it lit a fire. His call for accountability has already moved teams into action and raised expectations. This will take a partnership.
It’s time to raise the bar for the entire industry: together.
Amir Khayat, co-founder and CEO, Vorlon
SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
Cloud Security, Supply chain
Why JP Morgan Chase’s Patrick Opet’s letter at RSAC hit a nerve

(JPMorgan Chase)
An In-Depth Guide to Cloud Security
Get essential knowledge and practical strategies to fortify your cloud security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds