According to our 2025 third-party risk management (TPRM) impact report, 59% of risk and InfoSec leaders view AI as the single biggest factor in the future of the industry.
The reason is simple: AI is an amplifier. It takes great, disciplined TPRM and makes it faster, more insightful, and easier for those doing the assessment and their vendors. That means your existing resources go farther, allowing you to:
- Perform all the assessments you need (94% of companies say they’d assess more vendors if they had the capacity).
- Perform the depth of assessment you require (97% of companies say they don’t have time to go deep on vendor risk).
- Ease the burden on vendors to build stronger relationships.
- Get through the TPRM assessment process faster, so you can start to benefit from the tools and partnerships your business needs.
AI can deliver these outcomes by automating manual steps in the vendor assessment process, so you can get the decision-making info you need in a fraction of the time.
In this article, we’re sharing data from the Whistic Platform’s suite of AI capabilities—called Assessment Copilot—that demonstrate these time savings using some of the most commonly available vendor security documentation.
TPRM Automation Using Vendor Summary Tool
Before we dive into our findings, it’s important to understand how this information was generated in the platform and how Whistic AI is designed for automation. Whistic’s AI suite has two core capabilities:
1. Vendor Summary
Vendor Summary AI performs an automated assessment based on the vendor security documentation you’ve collected and made available to the platform. Using this documentation, Vendor Summary performs a risk assessment against your chosen framework; this can be a regulatory framework, standard questionnaire, or customized questionnaire.
The completed AI assessment includes:
- Designation as to the compliance of the vendor based on responses
- Complete rationale for every response
- Full citations for every response and direct links to the source
- Confidence scores based on the certainty of the response
- Designation as to the compliance of the vendor based on responses
- Full audit capabilities for deeper dives or to add notes to the completed report
2. SOC 2 Summary
This second core AI feature takes lengthy SOC 2 audit reports and distills them to a five-page executive summary based on your specific controls. This allows you to focus on meaningful exceptions without poring over hundreds of pages manually. It’s also digestible, making it perfect for sharing with the executive team or other stakeholders.
Methodology: Comparing Assessment Completion Percentages Using Common Frameworks
For the purposes of this article, we’ll be focusing on the automation results that can be achieved using the Vendor Summary tool. Specifically, we looked at the percentage of questions that AI was able to answer based on the following initial circumstances:
Assessment Framework
The assessment framework is used to determine if the vendor meets acceptable risk criteria; it’s the standard against which vendor risk is measured. For this report, we used Vendor Summary to measure compliance against four common security frameworks that cover a broad range of risk. These frameworks are:
- CAIQ LIte
- SIG Lite
- HECVAT (used for regulatory compliance in higher education)
- Whistic Control Framework (WCF; this framework is based on the NIST framework, modified to make the 98-question set more AI-ready)
Data Sources for the Assessment
AI automates vendor assessments based on the security data provided. But one of the most time-consuming parts of the TPRM process is collecting answers to custom questionnaires manually from a vendor. And 79% of all companies report that their process is largely questionnaire based.
But huge time savings are possible if you are able to begin an automated assessment with data that you either already have access to or is easier to source. This may include:
- Security profiles in a shared exchange like Whistic’s Trust Center Exchange
- Publicly available trust centers
- Risk rating services (utilized by 88% of companies we surveyed)
- Completed standards or audit reports like SIG, SOC 2, or CAIQ; many vendors have already collected such responses and are happy to share quickly (with the help of an NDA)
- Common security policies; these are also easier for the vendor to send than a questionnaire, and AI can analyze them so you don’t have to do it manually. This makes policies a much more resource-effective part of the process when you leverage AI.
For this comparison, we organized the available data types into tiers to illustrate how much time you can save based on the amount of data you have available:
- Tier 1: A completed SOC 2 audit report
- Tier 2: SOC 2 + collected policies*
- Tier 3: SOC 2 + policies + completed standard (CAIQ Lite, SIG Lite, and HECVAT)
We assessed each Tier of data against the WCF to measure:
- The percentage of questions AI could answer completely
- The percentage of questions AI could not answer, but could identify supporting sources
- The percentage of questions AI could not answer
Additionally, we assessed Tier 3 data sources against CAIQ Lite, SIG Lite, and HECVAT standards, respectively, to illustrate the time savings you can realize using other common frameworks.
Let’s take a look at the results.
Automated Assessment Responses Using the Whistic Control Framework
In the following chart, you can see the results achieved for each Tier of security data when Vendor Summary assessed them against the WCF: