77% of security breaches over the past three years originated with a vendor or third party (Whistic 2025). Point-in-time assessments using questionnaires alone miss dynamic risks; comprehensive due diligence combines multiple evidence sources.
Risk assessments combine standardized questionnaires (SIG, CAIQ, custom), evidence review (SOC 2 reports, ISO 27001 certificates, penetration test results), external risk ratings, and business-specific criteria into a composite risk score per vendor. Assessment scope scales by tier — critical vendors receive comprehensive assessment, low-tier vendors receive streamlined evaluation. Findings generate risk treatment plans with remediation requirements, acceptance criteria, and escalation thresholds.
Risk assessment platforms, questionnaire management engines, evidence collection portals, and risk scoring algorithms.
Pre-planned response procedures activated when a third party experiences a security breach, operational failure.
AI agents that automatically complete, review, and score vendor risk assessments — reducing assessment cycle time from weeks to minutes.
Assessment of environmental, social, and governance risks in third-party relationships driven by CSDDD, CSRD.