Back to Blog
IT Governance and Compliance

Third-Party Risk Management Is Broken — AI and Supply Chain Complexity Making It Worse

Third-party risk management is broken as incidents doubled from 15% to 30% in one year. 62% still over-trust AI-generated questionnaire answers creating error amplification. Gartner predicts 50% of programs shift to continuous monitoring by 2028. Integrating GRC and TPRM delivers 20%+ cost reductions. Organizations must move from prevention to resilience, map Nth-party supply chains, use AI for monitoring not checkbox automation, and build incident response with dependency mapping.

IT Governance and Compliance
Insights
10 min read
4 views

Third-party risk management is fundamentally broken in 2026. Despite decades of investment, 62% of organizations still overly trust due diligence questionnaire answers that are increasingly AI-generated. Furthermore, third-party-originating cybersecurity incidents doubled from 15% in 2024 to 30% in 2025. Gartner’s Predicts 2026 report warns that AI, rising supply chain attacks, and unreliable questionnaire data are forcing organizations to rethink their entire approach. However, most enterprises continue relying on static, point-in-time assessments that leave them vulnerable to threats emerging after contracts are signed. In this guide, we break down why traditional third-party risk management is failing, how AI creates both solutions and new risks for vendor assessment, and what CIOs should do to build resilient programs.

62%
Still Overly Trust AI-Generated Questionnaire Answers
2x
Third-Party Incidents Doubled: 15% to 30%
20%+
Cost Reduction From Integrating GRC and TPRM

Why Traditional Third-Party Risk Management Is Broken

Traditional third-party risk management programs are built on a fundamentally flawed assumption: that strong onboarding controls can prevent incidents altogether. This prevention-only mindset relies on due diligence questionnaires completed before contract signing. The process captures a snapshot of vendor security at one moment. However, risk does not stop at onboarding. Threats emerge continuously as environments change and new vulnerabilities appear. Consequently, organizations discover breaches months after they occur because their monitoring stopped at contract execution.

Furthermore, the supply chain has become extraordinarily complex. Direct vendors rely on their own vendors, who depend on additional providers. This creates multi-layered ecosystems where Nth-party risks are invisible to the organization at the top. Most enterprises use multiple TPRM tools because no single platform covers all risk domains spanning cybersecurity, supply chain, legal, and ESG. Therefore, fragmented programs create blind spots that attackers consistently exploit.

In addition, the doubling of third-party incidents from 15% to 30% in a single year signals that existing approaches are not keeping pace with threat evolution. This surge has prompted greater board attention to TPRM. Meanwhile, regulatory pressure from NIS2, DORA, and the EU AI Act explicitly requires supply chain security and third-party oversight. As a result, broken TPRM now carries personal liability alongside organizational fines.

The AI Questionnaire Trap

AI is making the questionnaire problem worse, not better. Vendors now use AI to generate polished questionnaire responses. Organizations then use AI to analyze those responses. When AI-generated answers are analyzed by AI systems, errors compound. Gartner describes this as a cycle of error amplification. Organizations believe they are becoming more efficient and data-driven. In reality, they are making decisions based on increasingly noisy and unreliable outputs. What looks like progress quietly undermines the credibility of third-party risk reporting.

How AI Creates Both Solutions and New Risks for Third-Party Risk

AI’s impact on third-party risk management is dual-edged and increasingly complex. It offers powerful capabilities for continuous monitoring and real-time threat detection. Simultaneously, it degrades the reliability of traditional assessment methods that most organizations still depend on. Gartner does not argue against using AI in TPRM. Instead, it emphasizes using AI strategically. The highest value of AI is not in automating checkbox activities. It is in supporting continuous monitoring, detection, and response where human teams cannot scale.

AI-Enhanced Monitoring
AI tools continuously scan vendor environments, track security posture changes, and detect anomalies in real time. This addresses the fundamental limitation of point-in-time questionnaires. Consequently, security teams gain persistent visibility rather than periodic snapshots of vendor risk.
Automated Risk Scoring
Machine learning models analyze external attack surfaces, identify vulnerabilities, and score vendor risk dynamically. Furthermore, these tools validate the effectiveness of security controls that questionnaires can only describe on paper.
Error Amplification in Assessment
When vendors use AI to generate questionnaire responses and organizations use AI to evaluate them, signal degrades. Each layer of AI processing introduces noise. Therefore, the apparent efficiency of AI-automated due diligence masks a growing disconnect from actual vendor risk posture.
AI Supply Chain Risk
AI models, training data, and inference pipelines create entirely new categories of third-party risk. Vendors providing AI services introduce risks around data poisoning, model integrity, and prompt injection. As a result, TPRM must expand to cover AI-specific vendor risk dimensions.

“Organizations must move beyond questionnaires toward continuous, intelligence-driven risk management.”

— TPRM Industry Analysis, Gartner Predicts 2026

The Shift From Prevention to Resilience in Third-Party Risk

Gartner’s most fundamental recommendation is shifting third-party risk management from a prevention-only mindset to a resilience-focused strategy. This requires changes across the entire TPRM operating model.

Dimension Prevention Mindset (Broken) Resilience Mindset (Required)
Assessment Approach Point-in-time due diligence at onboarding ✓ Continuous monitoring throughout relationship
Data Sources Self-reported questionnaire answers ✓ External scanning, ratings, and real-time telemetry
Scope Direct vendors only ✓ Nth-party visibility across supply chain layers
GRC Integration Separate tools and processes from cyber GRC ✓ Unified platform reducing costs by 20%+
Incident Readiness React after breach is discovered ✓ Pre-planned response with dependency mapping

Notably, by 2028 half of all TPRM programs will focus on continuous monitoring. This allows CISOs to repurpose due-diligence resources toward higher-value activities like incident response planning and dependency analysis. Furthermore, Gartner predicts that organizations integrating cyber GRC and TPRM functions will achieve more than 20% reductions in labor and technology costs. In contrast, fragmented programs face unsustainable complexity as vendor ecosystems expand. Therefore, convergence is not optional for organizations managing hundreds or thousands of third-party relationships across global operations.

The Nth-Party Blind Spot

Your vendors rely on their vendors, who rely on their own providers. This creates supply chain depth that most TPRM programs cannot see. A breach at a fourth-party provider can cascade through the chain to impact your organization. However, most monitoring stops at direct vendor relationships. The organizations that gain visibility into these deeper layers through supply chain mapping and continuous external monitoring will identify cascade risks before they materialize into incidents.

Building a Resilient Third-Party Risk Program

Resilient TPRM requires organizations to restructure their approach around continuous intelligence rather than periodic compliance exercises. The distinction is fundamental. Compliance-driven programs ask whether vendors met standards at a specific point in time. Intelligence-driven programs continuously assess whether vendors remain secure as threats evolve. Organizations that make this shift redirect human effort away from repetitive documentation toward higher-value risk management activities like incident response planning, dependency analysis, and strategic decision-making during vendor events. The human role shifts from form-filling to judgment-intensive work that AI cannot replace.

Resilient TPRM Characteristics
Continuous external monitoring replacing point-in-time questionnaires
Unified GRC and TPRM platforms eliminating siloed tools and processes
Supply chain mapping extending visibility to Nth-party relationships
AI used for monitoring and detection, not just automating checkbox tasks
Broken TPRM Patterns
Relying on AI-generated questionnaire responses as primary risk evidence
Monitoring only direct vendors while ignoring sub-tier dependencies
Treating TPRM as separate from enterprise cyber risk management
Measuring program success by questionnaires completed rather than risks mitigated

Five Priorities for Fixing Third-Party Risk Management

Based on the Gartner predictions and the doubling of third-party incidents, here are five priorities for CISOs restructuring their TPRM programs:

  1. Shift from questionnaire-first to monitoring-first: Because 62% still over-rely on questionnaire answers, deploy continuous monitoring tools that scan vendor environments in real time. Consequently, you detect risks as they emerge rather than months later.
  2. Integrate TPRM with your cyber GRC platform: Since convergence delivers 20%+ cost reductions, unify third-party risk with enterprise risk management. Furthermore, integrated platforms provide clearer accountability during incidents.
  3. Map your supply chain beyond direct vendors: Because Nth-party risks create invisible exposure, extend visibility at least two layers deep. As a result, you identify cascade risks before they reach your organization.
  4. Use AI strategically for monitoring, not just assessment: Since AI-on-AI questionnaire analysis amplifies errors, redirect AI investment toward continuous detection and anomaly identification. Therefore, AI strengthens resilience rather than creating false confidence.
  5. Build third-party incident response plans with dependency maps: With incidents doubling year-over-year, pre-plan responses for critical vendor failures including communication protocols and alternative sourcing. In addition, test these plans regularly through tabletop exercises.
Key Takeaway

Third-party risk management is broken as incidents doubled from 15% to 30% in one year. 62% still over-trust AI-generated questionnaire answers, creating error amplification. Gartner predicts 50% of programs will shift to continuous monitoring by 2028. Integrating GRC and TPRM delivers 20%+ cost reductions. Organizations must move from prevention-only to resilience-focused strategies, map Nth-party supply chains, use AI for monitoring rather than checkbox automation, and build comprehensive pre-planned incident response capabilities.


Looking Ahead: Third-Party Risk Beyond 2026

Third-party risk will grow more complex as AI agents become vendors’ primary service delivery mechanism. The Gartner Magic Quadrant for TPRM Tools, published in April 2026, reflects this maturing market with 15 vendors evaluated across comprehensive capability dimensions. When your vendors deploy autonomous agents that interact with your systems, the risk surface expands dramatically beyond what traditional cybersecurity assessments were designed to evaluate or contain effectively in a world of autonomous AI-powered vendor services. Furthermore, regulatory requirements under NIS2, DORA, and the EU AI Act will mandate increasingly rigorous supply chain oversight with personal liability for executives.

However, organizations that build resilient TPRM programs now will adapt more efficiently as new risks and regulations emerge. In contrast, those clinging to questionnaire-based approaches will face compounding exposure as supply chains deepen and AI-generated responses further degrade assessment reliability. The shift from prevention to resilience is not optional. It is the survival strategy for managing third-party risk in an era of autonomous AI and interconnected global supply chains that grow deeper with every vendor relationship.

For CISOs, third-party risk is therefore a strategic priority that demands investment, executive attention, and fundamental operating model change. The organizations that fix TPRM in 2026 will be positioned to manage the supply chain complexity that every analyst predicts will intensify through the end of the decade. Those that delay will find their programs overwhelmed by vendor volume, AI-generated noise in risk assessments, and regulatory demands that their broken processes cannot accommodate. The cost of inaction compounds with each new vendor relationship added to an already fragmented, under-monitored, and increasingly complex and vulnerable third-party ecosystem.

Related Guide
Our IT GRC Services: Governance, Risk and Compliance


Frequently Asked Questions

Frequently Asked Questions
Why is third-party risk management broken?
TPRM is broken because 62% of organizations rely on AI-generated questionnaire answers that create error amplification. Third-party incidents doubled from 15% to 30% in one year. Programs focus on onboarding prevention rather than continuous monitoring. Nth-party risks remain invisible in most assessments.
What is the AI questionnaire error amplification problem?
When vendors use AI to generate polished questionnaire responses and organizations use AI to analyze them, errors compound through each processing layer. Gartner describes this as a cycle of output degradation. Organizations believe they are improving efficiency while decisions are based on increasingly unreliable data.
What does continuous monitoring replace?
Continuous monitoring replaces point-in-time questionnaire-based assessments with real-time scanning of vendor environments. By 2028, half of TPRM programs will focus on continuous monitoring. This allows CISOs to redirect due-diligence resources toward incident response and dependency analysis.
What cost savings come from integrating GRC and TPRM?
Gartner predicts that by 2028, organizations integrating cyber GRC and TPRM will achieve more than 20% reductions in labor and technology costs. Convergence provides clearer accountability, better collaboration, and faster decision-making during third-party incidents compared to fragmented programs.
What are Nth-party risks?
Nth-party risks arise from your vendors’ vendors and their downstream providers. A breach at a fourth or fifth-party provider can cascade through the supply chain to impact your organization. Most TPRM programs monitor only direct vendors, leaving deeper layers invisible. Supply chain mapping extends visibility to identify these cascade risks.

References

  1. 62% Over-Trust Questionnaires, Error Amplification, Prevention to Resilience, 50% Continuous Monitoring, 20% Cost Reduction: RiskRecon — 5 Key Takeaways From Gartner Predicts 2026 on Third-Party Cyber Risk
  2. Incidents Doubled 15% to 30%, Board Attention, AI Innovation vs Risk, Magic Quadrant 2026: OneTrust — Recognized in Gartner’s First TPRM Magic Quadrant 2026
  3. Multi-Layered Supply Chains, Multiple TPRM Tools, Continuous Visibility, Lifecycle Management: RiskRecon — 5 Key Takeaways From Gartner 2025 Market Guide for TPRM
Weekly Briefing
Security insights, delivered Tuesdays.

Join 1 million+ security professionals. Practical, vendor-neutral analysis of threats, tools, and architecture decisions.