Dhārā VII
Mitra Stream

Sovereign Judgment

Mitra, the trusted alliance

Strategic GRC leadership, third-party maturity, and vendor CCMM. For practitioners who govern at programme level: the question is not whether controls exist, but whether the programme holds under real pressure.

Third-Party Risk TPRM Vendor CCMM Strategic GRC GRC Leadership
Strategic GRC Leadership and Trust Architecture

You are not here to rubber-stamp, you are here to make it extraordinary. Vague intentions are lies. Lead with recommendation, not options, the leader is paying for your judgment, not a menu. The three modes: Cathedral (dream the ideal and push toward it), Bulletproof (make it survive contact with reality), Surgeon (cut to the minimum that achieves the outcome). The leader knows which mode before the room fills.

In scope
Vendor maturity rating, CCMM ally threshold, evidence-based, reproducible
Third-party assessment as trust architecture, not compliance exercise
Strategic GRC programme design for senior practitioners
CEO-mode governance review, plan, retrospective, ship, review
Permission architecture, exercising judgment that leadership requires
The ally threshold: who earns the relationship and who does not
Practitioner development for those who have earned the right to decide
Outside this stream
Internal GRC programme methodology (Dhārā I)
AI governance and model risk (Dhārā II)
Capital allocation and signal intelligence (Dhārā V)
Regulatory enforcement tracking (Dhārā VI)
Who this is for
CAE who must challenge the board · CISO who must say no to the CEO · GRC leader trained to hedge who needs to stop · Any senior practitioner who has earned the right to decide and needs the framework to exercise it
Stop producing options. Start producing recommendations. Build vendor assessment programmes that are defensible, reproducible, and commercially real. Exercise the judgment the profession trained out of you.

Field Notes

1 entry
Mar 2026 Field Note

Third-Party Vendors: The Control Failures Behind the Breaches

The control failures that show up in third-party-vendor breaches, and the supervisory-examination pattern that follows. The procurement gates that actually catch them.

Read field note

All seven streams

Collaborate