Three converging forces are expanding the GRC function beyond traditional compliance administration and the practitioners who adapt earliest will define the next tier of the field
The Governance, Risk & Compliance function has a well-earned reputation for stability. Frameworks change slowly. Audit cycles are predictable. The core disciplines; risk assessment, control mapping, compliance documentation - have remained recognizable for decades.
That stability is dissolving.
Three converging forces are compressing what would normally be a decade of evolution into a 2 to 3 year window: the emergence of AI governance as a formal compliance discipline, the maturation of cloud-native architectures that require fundamentally different compliance approaches, and the escalation of third-party and supply chain risk as the dominant breach vector against enterprise organizations.
Together, these trends are not merely adding responsibilities to the GRC function. They are redefining what GRC practitioners are expected to know, what they are expected to produce, and what constitutes competitive competency in the hiring market.
This article examines each trend in detail, draws on both industry data and direct practitioner experience, and offers a clear framework for how GRC professionals can position themselves ahead of the shift.
In 2023, most compliance teams were still debating whether AI governance was a legal problem or a technology problem. By 2025, the answer is unambiguous: it is a GRC problem.
The regulatory environment has moved from advisory to binding. The EU AI Act (entering enforcement in phased stages) created formal compliance obligations for organizations deploying high-risk AI systems in European markets. ISO/IEC 42001:2023 established the international standard for AI Management Systems, providing the audit-ready framework that ISO 27001 provides for information security. NIST released its AI Risk Management Framework in early 2023, which has since become the most referenced voluntary standard for AI governance in US-regulated industries.
The practical consequence for GRC teams is significant. Practitioners are now being asked to:
In my own experience managing vendor risk assessments, AI vendor evaluation criteria were already being integrated into formal procurement reviews. The questions had shifted from "is this vendor's security posture adequate?" to "can we audit the decisions this AI system is making, and does the vendor's model governance documentation meet our regulatory requirements?"
"The GRC professionals who develop AI governance fluency now will occupy a high-value, low-supply position in the talent market for the next 3-5 years. The window to be early is open, but narrowing."
| Framework | Type | Jurisdiction | GRC Relevance | Status |
|---|---|---|---|---|
| EU AI Act | Regulation | European Union | Binding compliance obligations for high-risk AI systems | Enforcement Active |
| ISO/IEC 42001:2023 | International Standard | Global | Auditable AI Management System (AIMS) : (Certifiable) | Published & Active |
| NIST AI RMF | Framework | United States | Voluntary risk management standard; widely adopted | Widely Adopted |
| UK AI Pro-Innovation Framework | Policy | United Kingdom | Principles-based approach; sector regulators apply | Evolving |
| Canada AIDA | Proposed Legislation | Canada | Artificial Intelligence and Data Act | In Development |
When SOC 2 was first defined, most enterprises ran on-premise infrastructure. Compliance was about auditing binders of policies and reviewing access logs from physical servers. The paradigm was static and cyclical; annual audit, annual assessment, annual review.
Today, the average enterprise operates across three or more cloud providers, uses 200+ SaaS applications, and deploys infrastructure via code that can change hundreds of times daily. The compliance paradigm that worked for on-premise environments is structurally incompatible with this reality.
The implications for GRC practitioners are structural, not incremental. Cloud compliance requires a fundamentally different skill set:
In completing the SOC 2 cloud control mapping project within my portfolio series, a consistent finding emerged that mirrors what practitioners see in production environments: most cloud environments are already 60–70% of the way to SOC 2 compliance. The technical controls exist. IAM is configured. CloudTrail is running. S3 buckets are encrypted.
The gap is almost entirely documentation. Controls are not formally linked to Trust Service Criteria. Evidence is not organized for audit consumption. Configuration changes are not tracked in a compliance context.
"Cloud compliance is not an architecture problem. It is a documentation, evidence management, and continuous monitoring problem and those are GRC skills, not engineering skills."
The data tells a consistent story: in the current threat environment, the most reliable path to compromising an enterprise organization is not to attack it directly. It is to find a vendor, supplier, or partner in its ecosystem with weaker controls and use that relationship as a bridge.
The 2020 SolarWinds compromise. The 2021 Kaseya attack. The 2023 MOVEit breach. The 2024 Snowflake credential theft campaign. Each of these incidents, affecting hundreds to thousands of downstream organizations, entered through a trusted third-party relationship.
The GRC response to this pattern has been the formalization of Third-Party Risk Management (TPRM) as a distinct discipline within compliance programs with its own staffing, tooling, and reporting structures. Where TPRM once meant sending a questionnaire to major vendors annually, modern programs include:
The TPRM function represents one of the clearest market opportunities for GRC professionals in 2025-2026. Organizations that previously had no formal vendor risk program are building dedicated teams in direct response to regulatory mandates (DORA, NIS2, SEC cyber disclosure rules) and high-profile third-party breach incidents.
"Your vendor list is your attack surface. The GRC professionals who understand how to assess, tier, and monitor that surface are among the most sought-after practitioners in the field right now."
The convergence of these three trends is producing a new professional profile in GRC, one that does not yet have a widely accepted title but is increasingly recognizable in hiring conversations.
The traditional GRC analyst was primarily a compliance administrator: framework-aligned, process-oriented, audit-focused. That practitioner remains valuable. But the ceiling for that profile is declining as the function expands.
The emerging GRC practitioner profile requires four capabilities operating in combination:
These four capabilities are not equally distributed in the current talent pool. Practitioners with all four - particularly those with demonstrable fluency in AI governance and cloud compliance - represent a supply-demand imbalance that currently favors the practitioner significantly.
The GRC analyst of 2026 is not the GRC analyst of 2020. The function has expanded from compliance administration to risk intelligence, from annual audit cycles to continuous monitoring, from point-in-time vendor reviews to ongoing supply chain risk management, and from information security governance to AI governance as a parallel and growing discipline.
The practitioners who thrive in this environment will be those who treat GRC as what it increasingly is: a dynamic, technical, and strategically consequential function and not a documentation exercise.
The convergence is already underway. The organizations building AI governance programs, maturing their cloud compliance postures, and investing in formal TPRM capabilities are not planning for a future state. They are responding to current regulatory obligations, current breach patterns, and current board-level risk expectations.
The question for GRC professionals is not whether to adapt. The question is how quickly the adaptation begins.