This Week...
View web version
NEWSWIRE
August 10 2023
TW LI
SC Media | The CyberSecurity Source
Are you drowning in compliance?
As new mandates come online with staggering frequency, most firms need to ensure IT systems are compliant with some kind of regulation. But is compliance proving too heavy a burden and stealing resources from cybersecurity efforts?

Four out of five firms are more worried about compliance than they were five years ago, according to recent research from Hornetsecurity. In more than half (57%) of organisations, the IT department bears the load of compliance assurance, the study reveals.

And, in the majority of cases, compliance overload has a significant impact on the IT function's ability to do its job, As a result, 13% of firms are unable to state whether they are fully compliant.

"Compliance is a heavy burden for many organisations because it requires a high level of operational maturity to handle effectively," says Daniel Hofmann, CEO of Hornetsecurity.

"There are processes, organisational ard technical components. A given organisation may be beholden to multiple regulatory frameworks and governing bodies – each with its own ever-changing rules and requirements. On top of that, amidst the chaos of getting these controls into place, many organisations struggle to keep up with changing regulations."

In many cases, this is complicated by the fact that different people within the organisation are responsible to various regulators.

"GDPR, for example, falls under the data protection officer's remit, PCI or the Digital Operational Resilience Act (DORA) regulation might fall on business application owners, while NIS2 may come under an organisation's CIO or CISO remit," says Romain Deslorieux, director strategic partnerships for cloud protection at Thales.

This stretches resources, so the trick is to find some commonality. There are similar actions demanded by most regulations, says Deslorieux, such as "assessment, records of workloads and processing, protection of data, – and improving the amount of internal communication that's taking place."

He adds: “Many regulations have four main objectives in common: define the scope of responsibilities regulated; mandate to run a risk assessment in relation to that scope; list technical and organisational measures required to mitigate the risks; and list obligations towards supervisory authorities, such as reporting and penalties."

Major distraction
However, at a time when many organisations are also struggling to ensure adequate cybersecurity, often with overworked staff, aren't compliance efforts likely to have an impact?

"The burden of compliance can be distracting," says Erfan Shadabi, cybersecurity expert at comforte AG. "Instead of proactively fortifying their defenses and staying ahead of cyberthreats, organisations may find themselves allocating significant time and resources to meet regulatory obligations."

Compliance and security are not the same thing.

"While being compliant with certain regulatory frameworks does tend to improve a business's security posture through documentation and good security practices, being compliant is by no means a guarantee of security," says Hofmann. "There is also an argument to be made that IT departments that are focusing heavily on complex compliance requirements may mistakenly miss security basics."

Seek common ground
Once again, the answer may be to look for overlap between the two areas.

"Many compliance frameworks specify similar things to IT security best practices that organisations are likely already striving for," says Deslorieux. "For example, if an organisation already has reached certifications such as ISO27001 or ISO27701 IT security procedures, this will go a long way towards reaching compliance with other regulations.

“Security is never an absolute statement and the most effective teams and organisations work on that basis. But if you are fully compliant with regulation such as GDPR, DORA, NIS2, alongside following certification standards such as ISO27001 and ISO27701, you are more likely to be more secure than if you had no plan."

However, be mindful of assuming that security and compliance have the same goals or methods.

"On occasion, you will run into a requirement that is no longer best practice or industry standard, but if you don't implement it, you will technically be 'out of compliance'," explains Lecio de Paula, VP of data protection at KnowBe4. "Compliance can be beneficial to security if you approach it with the right mindset, but we see often that organisations will implement half-baked controls to meet the bare minimum requirements.

“This can often lead to worse security as now you have a patchwork of controls you are barely maintaining and haven't actually focused on solving the problem of securing your organisation's assets and data."
Pretexting’: the next cybersecurity epidemic?

SC Media UK’s sister brand — Management Today — has a new report designed to help businesses get ahead of costly and sophisticated Business Email Compromise (BEC) attacks. Learn how the fraudsters target their victims and what bosses can do to protect their team members from being next on the list.

DOWNLOAD YOUR COPY HERE
Quote of the week

“Government departments will always be a top target for hostile actors because of the lucrative data they hold and potential for mass disruption. However, the attack does highlight the need for a more agile response to security incidents, especially as we start to see more AI-based attacks that can evade defences. This means shifting away from static, network-based security models to focus on users, assets, and resources."
 
Gary Barlet, federal field CTO at Illumio comments on the UK's Electoral Commission cyberattack which allowed hostile actors to access electoral registers.
 

Report: Almost half of UK businesses hacked
Nearly half (49%) of British businesses have experienced a cyberattack, according to a survey from Indusface. The poll of 2,200 respondents from 16 different industries also found:
  • More than three in four (78%) education organisations have experienced a cyberattack.
     
  •  The majority (83% ) of education-sector companies don’t actively train their employees in cybersecurity — the third lowest percentage after transport (89%) and accommodation (97%). 
     
  • Over a quarter (26%) of financial services sector companies have experienced a cyberattack.
     
  • Almost two thirds (64%) of survey respondents reported that email hacking was the method used in their cyberattack.
For the full results, click here
UNSUBSCRIBE PRIVACY NOTICE
© 2020 Haymarket Media Group
Bridge House, 69 London Road, Twickenham , TW1 3SP
Haymarket
This bulletin has been sent to smd@h4xr.com