Checkbox Assessments Aren't Fit to Measure to Risk
Dark ReadingArchived May 14, 2026✓ Full text saved
Security governance needs to be more than an annual compliance exercise. New companies are emerging to address risk-management gaps in current audit tools.
Full text archived locally
✦ AI Summary· Claude Sonnet
CYBER RISK
Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.
Checkbox Assessments Aren't Fit to Measure to Risk
Security governance needs to be more than an annual compliance exercise. New companies are emerging to address risk-management gaps in current audit tools.
Arielle Waldman,Features Writer,Dark Reading
May 13, 2026
5 Min Read
SOURCE: ANDRIY POPOV VIA ALAMY STOCK PHOTO
A rapidly evolving threat landscape with highly adaptable and increasingly sophisticated threat actors is no place for checkbox compliance assessments that merely audit organizations' security postures once a year. That's why security professionals and industry experts are calling for compliance models that take a more continuous approach, and more companies continue to emerge in the space.
Industry leaders and CISOs continually poke holes in the way governance, risk management, and compliance (GRC) and third-party risk management (TPRM) assessments are conducted – and the holes are only growing bigger. Yearly assessments, with their static questionaries to determine an organization's risk level, are stagnant, the polar opposite of how attackers' behave. Threat actors can now find and exploit vulnerabilities faster and discover new vectors to conduct supply-chain attacks.
When the compliance industry started, assessments mirrored finance industry models – a yearly audit to determine if companies met objectives and obligations, explains Sravish Sridhar, TrustCloud CEO and founder.
Related:Research Hub Bridges Cybersecurity Gap for Under-Resourced Organizations
"Attackers weren't worldwide and trying to infiltrate you from every angle," warns Sridhar.
Old models were fine when IT changes and IT fragmentation happened slower. But now the pace is accelerating faster than most can handle, he adds. TrustCloud’s 2,000 customers range from pharmaceutical and healthcare to government and manufacturing.
With the static, check-the-box approach, a vendor can be fully compliant on paper with their third-party program and still introduce meaningful risk into the business, warns Lamont Atkins, partner and McKinsey and Company. Atkins has also observed CISOs move decisively away from questionnaire-driven checkbox compliance models toward a more continuous and evidence-based assurance.
Modern TPRM platforms continuously emerge to monitor vendors for vulnerabilities, misconfigurations, and breach signals, versus relying on static questionnaires, and use artificial intelligence (AI) to analyze those signals and assess risk, explains Swee Khan Goh, Omdia research analyst. He singled out Upguard, BitSight, and OneTrust as three companies doing well in this space.
'It's Not a Predictor of Risk Whatsoever'
While launching TrustCloud, Sridhar heard from CISOs that GRC stood for "government, risk, and check the box." They told him that we live in a world where vulnerabilities and risk are growing higher and higher, and compliance obligations are getting larger due to all the regulations.
Related:Electricity Is a Growing Area of Cyber-Risk
When he asked CISOs for a better alternative, they described a continuous monitoring engine with graphs that connect all the interdependencies in their businesses, looking at every node and validating if it is operating effectively, he says.
"It was an 'Aha' moment for us, " Sridhar tells Dark Reading. Therefore, he focused development to build a tool for scale and complexity to meet an array of enterprise needs.
The new threat landscape left TrustCloud with three main challenges while working on the platform over the last four and a half years. First, they had to develop a tool that could be integrated to fit a variety of enterprise rules and environments. Next, the team had to solve for scale. Companies manage an overwhelming number of assets, including human and non-human identities. Thirdly, every CISO has their own style and Sridhar wanted them to be able to take all the complex data and translate it in a way they want to tell the story.
For example, CISOs need tools for assessments that help them communicate clearly to the board and leadership, whether that board lacks technical expertise or is more risk-focused compared to others. Sridhar factored those needs in, knowing how important it is for CISOs to elicit emotion during presentations to the board and leadership who oversee the budget and operations.
Related:Lies, Damned Lies, and Cybersecurity Metrics
He wanted the board to "react to the results" whether in a positive way, or perhaps with more anxiety if the assessment results spotted trouble.
CISOs also need a way to prove more tangible data, like how are they contributing to revenue, business acceleration, or to reduce financial risks, adds Sridhar.
"The current compliance process is useless in most companies," Sridhar says. "A light security questionnaire – it's not a predictor of risk whatsoever."
Change the Model, Change the Mindset
To create a model that can keep up with today's threat landscape, Atkins urged companies to leverage TPRM platforms that provide ongoing visibility into attack surface, security posture, and incident signals. Some organizations are using AI to streamline questionnaires, but they can also leverage it to reduce reliance on questionnaires altogether by automating evidence collection, mapping controls across frameworks, and identifying gaps in real time, he adds.
He advised companies to ask themselves three main questions: Which suppliers truly underpin critical operations? Which are hidden concentration risks? And what is the operational blast radius if a key vendor fails?
"That's a fundamentally different mindset from traditional compliance-driven TPRM," Atkins tells Dark Reading. "To take the advantage, we must encourage a convergence between third-party risk management and attack surface management, as well as a broader reframing of TPRM as a component of enterprise resilience, not just a procurement or compliance function."
CISOs don't want to know whether a vendor claims to have a control: They want to understand how a failure would impact critical business processes, says Optiv CISO, Rob Gregory. Another notable shift Gregory observed is toward scenario-based risk analysis, which helps security leaders prioritize what matters versus treating all findings as equal, he adds.
"AI‑assisted analysis is also starting to mature, especially in translating technical risk into clear, board‑level narratives," Gregory tells Dark Reading. "Vendors that can support continuous insight, automation, and business context are the ones resonating most with experienced CISOs."
As risks expand and attackers' leverage more advanced tooling, the space is bound to keep evolving. But the most important aspect of risk assessment will remain: Building trust between security teams and stakeholders. And that extends to consumers as well.
"Trust doesn't imply that you're perfect," Sridhar says. "Trust implies you will have breaches. You will have anomalies. There will always be days in which you have a bad day, but it's how you react and how you own up to it, and how you remediate. That's how you build trust."
About the Author
Arielle Waldman
Features Writer, Dark Reading
Arielle spent the last decade working as a reporter, transitioning from human interest stories to covering all things cybersecurity related in 2020. Now, as a features writer for Dark Reading, she delves into the security problems enterprises face daily, hoping to provide context and actionable steps. She looks for stories that go past the initial news to understand where the industry is going. Her coverage areas include identity and access management, cyber risk and operations, industrial control systems, operational technology, and ransomware trends.
She previously lived in Florida where she wrote for the Tampa Bay Times before returning to Boston where her cybersecurity career took off at SearchSecurity. When she's not writing about cybersecurity, she pursues personal projects that include a mystery novel and poetry collection.
Want more Dark Reading stories in your Google search results?
ADD US NOW
More Insights
Industry Reports
How Enterprises Are Developing Secure Applications
Inside RSAC 2026: security leaders reveal the risks redefining your defense strategy
How Enterprises Are Harnessing Emerging Technologies in Cybersecurity
Ditch the Data Center: Understanding Flexible Cloud Infrastructure Security Management
2025 State of Malware
Access More Research
Webinars
What is the Right Role for Identity Threat Detection and Response (ITDR) in Your Organization?
Your Guide to Securing AI Adoption in Your Organization
The New Attack Surface: How Attackers Are Exploiting OAuth to Own Your Cloud Workspace
Prompt Injection Is Just the Start: Securing LLMs in AI Systems
Anatomy of a Data Breach: What to Do if it Happens to You
More Webinars
You May Also Like
CYBER RISK
How Can CISOs Respond to Ransomware Getting More Violent?
by James Doggett
JAN 28, 2026
CYBER RISK
US Cyber Pros Plead Guilty Over BlackCat Ransomware Activity
by Alexander Culafi
JAN 05, 2026
CYBER RISK
Switching to Offense: US Makes Cyber Strategy Changes
by Robert Lemos, Contributing Writer
NOV 21, 2025
CYBER RISK
Microsoft Exchange 'Under Imminent Threat,' Act Now
by Arielle Waldman
NOV 12, 2025
Edge Picks
APPLICATION SECURITY
AI Agents in Browsers Light on Cybersecurity, Bypass Controls
CYBER RISK
Browser Extensions Pose Heightened, but Manageable, Security Risks
CYBERSECURITY OPERATIONS
Video Convos: Agentic AI, Apple, EV Chargers; Cybersecurity Peril Abounds
ENDPOINT SECURITY
Extension Poisoning Campaign Highlights Gaps in Browser Security
Latest Articles in The Edge
CYBER RISK
Research Hub Bridges Cybersecurity Gap for Under-Resourced Organizations
MAY 5, 2026
CYBERSECURITY OPERATIONS
Helping Romance Scam Victims Requires a Proactive, Empathic Approach
APR 24, 2026
CYBER RISK
Electricity Is a Growing Area of Cyber-Risk
APR 22, 2026
VULNERABILITIES & THREATS
NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities
APR 16, 2026
Read More The Edge
Want more Dark Reading stories in your Google search results?
LOADING...
BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE
Experience cutting-edge cybersecurity insights in this four-day event. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass.
GET YOUR PASS