Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Compliance does not equal security: 7 cybersecurity experts share their insights
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Compliance does not equal security: 7 cybersecurity experts share their insights

4 years ago Joe Pettit
Compliance does not equal security: 7 cybersecurity experts share their insights

It is often stated that security is hard.  Whether it is the people, processes, and technology, or any combination of the three, security is a never ending challenge.  Conversely, compliance is the opposite.  Compliance is relatively straightforward. For too long, and for too many organisations, meeting a compliance standard was seen as a satisfactory way to boast of security. The competing ideologies of security versus compliance have long vexed even the most optimistic cybersecurity professional.

We wanted to help to offer some professional insight on this inherent dissonance, so we asked some experts for their thoughts on compliance and security, and where the two could harmoniously intertwine.

What are the limitations of compliance when it comes to cybersecurity?

Gary Hibberd | Professor of Communicating Cyber | @AgenciGary

Compliance with legislation or standards is merely the entry point for cybersecurity. Complying with these requirements is therefore relatively easy, but it doesn’t necessarily mean you are more secure.

Angus Macrae | Head of Cybersecurity | @AMACSIA

The limitations are that the cyber world outside of compliance still moves very quickly, and simply being certified with a particular standard does not and cannot necessarily mean that you are in all ways “cyber secure.” It’s the same way that a driving test cannot possibly prepare you for every eventuality you may encounter on the roads—including situations caused by other drivers. Even so, passing a driving test should put you in a better place to deal with those situations than if you had not taken it.

 

Christian Toon | CISO | @christiantoon

christian toon

Compliance can drive a culture of checking the box to deliver the bare minimum, and this is wrong on so many levels when it comes to cybersecurity.

Our adversaries know organizations take this approach, and they will craft their attack plans accordingly. Having a more agile and purposeful approach allows you to match your defenses to the threats you face. In this way, you assess everything for risks in a way that informs your response. You can thereby define what appropriateness looks like for your business, all the while bringing your people along with you as supporters.

Sarah Clarke | Security Governance, Risk, Compliance Specialist | @TrialByTruth

How much risk is tolerable is the real question and the persistent challenge. Compliance efforts are too often aimed at just securing cyber insurance dealing with a regulated industry customer. The disconnect between the compliance line and a robust threat and risk assessment can result in significant levels of misinformed spending. Compliance is transient comfort. Robust risk management is persistent (but better informed) discomfort. The latter should be preferable.

 

Caryll Arcales | Global Security Specialist

Due to the changes in technology, one limitation of compliance is that it does not align, or it lags behind the latest trends in cybersecurity. For example, ISO 27001 was just updated recently to cover cloud security controls (not even published yet) despite cloud having emerged on the scene years ago.

Dean Ferrando | SE Manager, EMEA at Tripwire | @deanferrando

dean ferrando

Compliance tries to help in considering areas that could be of concern, this is acceptable for the generic organisation, but what about areas that are specific to the individual organisation that the compliance framework did not consider? Compliance adherence is often dealt with on a set frequency, i.e., once a year, once a quarter, or some other interval. Security is about dealing with alerts consistently, and as they show up, making sure that any risks opened up with business-as-usual activities are dealt with immediately rather than only being discovered during the annual compliance scan.

What should organizations consider when it comes to closing the gap between compliance and security?

Gary Hibberd | Professor of Communicating Cyber | @AgenciGary

Organizations should consider developing a Governance, Risk and Compliance (GRC) framework that looks at how standards and legislation are adhered to, the risks confronting the business, and how compliance can be evidenced.

A GRC framework works best when it brings together multiple people from across the organization to focus on security together.

Angus Macrae | Head of Cybersecurity | @AMACSIA

Compliance is a good way of otherwise disparate parties demonstrating to each other that they have the commitment to meet certain non-negotiables with a similar if not equivalent level of rigor. This can then form the first pillars of credible trust. Certain compliance activities in many sectors are also legislative and not necessarily a matter of choice, which can help get certain cybersecurity activities or investments prioritized in a way that they may not otherwise be.

Christian Toon | CISO | @christiantoon

This isn’t about ‘not’ being legally compliant, which of course is expected. It’s about framing the approach. Behind the scenes, you need to make sure you can map “Acme Corps’” control framework to your compliance obligations. There will always be an auditor waiting round the corner or a client expecting a particular standard to your industry. You’ll be closing that gap because your people will operate differently.

If you get this framing right, your customers will see the difference, you can differentiate yourself against the competition, and create a security program that operates threat based controls.

Sarah Clarke | Security Governance, Risk, Compliance Specialist | @TrialByTruth

The critical partner piece is a responsibility assignment matrix, also known as a RACI model. Nothing will get done if senior stakeholders are not getting clear and concise information on the scale and nature of required work. It has to be in context of all the other organizational priorities and stakeholders you depend upon for input.

This informs a justification for required exceptions from specified compliance benchmarks or clarity about required spend and trade-offs for non-negotiable requirements.

Stuart Coulson | Manager of Business Engagement | @SPCoulson

Compliance does not equal security. Security does not equal secure. Compliance demonstrates a minimum standard to compliance, while security shows the process of implementing controls for compliance and perhaps even a step beyond the level set by the standards. However, “secure” means being able to mitigate attacks.

 

Caryll Arcales | Global Security Specialist

Communication is the key. This is especially true when it comes to closing the gap between compliance and security. Teams need to collaborate with each other to align cybersecurity with compliance. This should be supported by management. Good management can contribute by ensuring that there’s efficient communication.

How do you get your business to buy into cybersecurity projects?

Stuart Coulson | Manager of Business Engagement | @SPCoulson

If you are hitting a barrier of budget for your security controls, then you probably are experiencing a disconnect between your IT Security strategy, the risks the organisation faces, and how you will mitigate those risks. Start by working with the risk owners to identify their real-world issues, then identify the technical controls that will resolve fully those risks. Ensure compliance to standards for your controls and then create a holistic strategy based around those controls.

If you try and do it the other way around, then you will not be directly addressing the issues of the users and key stakeholders. All too often, vendors will sell the dream that they can solve all your woes, but rarely is that the case. Ensure you create a list that addresses risks, and mitigate those. Sure, keep an eye to the future, but if you are just starting out, be led by your risks.

Gary Hibberd | Professor of Communicating Cyber | @AgenciGary

You have to change the conversation and make it about adding value. The challenge is that cybersecurity is often seen as a cost centre or something that slows down innovation or business processes. But if we can change the narrative, then securing the budget won’t be such a challenge. We, as cybersecurity professionals, need to become better at listening to the business and its needs. By doing so, we can better understand business objectives and their direction and see how we can help on this journey.

By focusing on the people around the boardroom table and what they are trying to achieve, we can reframe what we do to support and help them. The CFO typically wants to save money, so show how spending on cybersecurity can be better targeted. The CEO will want to increase market value, so show them how good cybersecurity can protect brand reputation. The Sales Director will want to increase sales, so show them how they can use cybersecurity as a business differentiator and a competitive advantage.

 A lot of this is about education and becoming better at communicating the benefits of cybersecurity. Essentially, we must become better communicators of the benefits of what we do.

Dean Ferrando | SE Manager, EMEA at Tripwire | @deanferrando

The old adage of “it’s not if you will be breached, but when”, still stands true, and trying to cater for that scenario from the start should pay for itself in the long run. There are a lot more benefits for organisations to adopt a security approach such as removing the unexpected costs of compliance alterations when the mandated frameworks change.  When that occurs, organisations have to re-asses their entire estate to see if their scope / security configurations have changed. Obviously, any identified changes could add additional unexpected costs to the organisation. If an organisation adopts a security approach from the start, then as long as the estate is being constantly monitored and protected to a higher standard than the bare minimum framework, any framework changes would most probably be irrelevant, again, reducing the long-term cost to the organisation.

While security is more difficult than simply achieving compliance, our experts make it clear that a security-centric approach will yield greater benefits. Above all, demonstrable value is an important aspect to proving why compliance should be a passenger in the security vehicle. Security must be the driver.

To learn more, download the whitepaper “Mind the Cybersecurity Gap – Why Compliance Isn’t Enough.”

Compliance does not equal security: 7 cybersecurity experts share their insights

It is often stated that security is hard.  Whether it is the people, processes, and technology, or any combination of the three, security is a never ending challenge.  Conversely, compliance is the opposite.  Compliance is relatively straightforward. For too long, and for too many organisations, meeting a compliance standard was seen as a satisfactory way to boast of security. The competing ideologies of security versus compliance have long vexed even the most optimistic cybersecurity professional.

We wanted to help to offer some professional insight on this inherent dissonance, so we asked some experts for their thoughts on compliance and security, and where the two could harmoniously intertwine.

What are the limitations of compliance when it comes to cybersecurity?

Gary Hibberd | Professor of Communicating Cyber | @AgenciGary

Compliance with legislation or standards is merely the entry point for cybersecurity. Complying with these requirements is therefore relatively easy, but it doesn’t necessarily mean you are more secure.

Angus Macrae | Head of Cybersecurity | @AMACSIA

The limitations are that the cyber world outside of compliance still moves very quickly, and simply being certified with a particular standard does not and cannot necessarily mean that you are in all ways “cyber secure.” It’s the same way that a driving test cannot possibly prepare you for every eventuality you may encounter on the roads—including situations caused by other drivers. Even so, passing a driving test should put you in a better place to deal with those situations than if you had not taken it.

Christian Toon | CISO | @christiantoon

Compliance can drive a culture of checking the box to deliver the bare minimum, and this is wrong on so many levels when it comes to cybersecurity.

Our adversaries know organizations take this approach, and they will craft their attack plans accordingly. Having a more agile and purposeful approach allows you to match your defenses to the threats you face. In this way, you assess everything for risks in a way that informs your response. You can thereby define what appropriateness looks like for your business, all the while bringing your people along with you as supporters.

Sarah Clarke | Security Governance, Risk, Compliance Specialist | @TrialByTruth

How much risk is tolerable is the real question and the persistent challenge. Compliance efforts are too often aimed at just securing cyber insurance dealing with a regulated industry customer. The disconnect between the compliance line and a robust threat and risk assessment can result in significant levels of misinformed spending. Compliance is transient comfort. Robust risk management is persistent (but better informed) discomfort. The latter should be preferable.

Caryll Arcales | Global Security Specialist

Due to the changes in technology, one limitation of compliance is that it does not align, or it lags behind the latest trends in cybersecurity. For example, ISO 27001 was just updated recently to cover cloud security controls (not even published yet) despite cloud having emerged on the scene years ago.

Dean Ferrando | SE Manager, EMEA at Tripwire | @deanferrando

Compliance tries to help in considering areas that could be of concern, this is acceptable for the generic organisation, but what about areas that are specific to the individual organisation that the compliance framework did not consider? Compliance adherence is often dealt with on a set frequency, i.e., once a year, once a quarter, or some other interval. Security is about dealing with alerts consistently, and as they show up, making sure that any risks opened up with business-as-usual activities are dealt with immediately rather than only being discovered during the annual compliance scan.

What should organizations consider when it comes to closing the gap between compliance and security?

Gary Hibberd | Professor of Communicating Cyber | @AgenciGary

Organizations should consider developing a Governance, Risk and Compliance (GRC) framework that looks at how standards and legislation are adhered to, the risks confronting the business, and how compliance can be evidenced.

A GRC framework works best when it brings together multiple people from across the organization to focus on security together.

Angus Macrae | Head of Cybersecurity | @AMACSIA

Compliance is a good way of otherwise disparate parties demonstrating to each other that they have the commitment to meet certain non-negotiables with a similar if not equivalent level of rigor. This can then form the first pillars of credible trust. Certain compliance activities in many sectors are also legislative and not necessarily a matter of choice, which can help get certain cybersecurity activities or investments prioritized in a way that they may not otherwise be.

Christian Toon | CISO | @christiantoon

This isn’t about ‘not’ being legally compliant, which of course is expected. It’s about framing the approach. Behind the scenes, you need to make sure you can map “Acme Corps’” control framework to your compliance obligations. There will always be an auditor waiting round the corner or a client expecting a particular standard to your industry. You’ll be closing that gap because your people will operate differently.

If you get this framing right, your customers will see the difference, you can differentiate yourself against the competition, and create a security program that operates threat based controls.

Sarah Clarke | Security Governance, Risk, Compliance Specialist | @TrialByTruth

The critical partner piece is a responsibility assignment matrix, also known as a RACI model. Nothing will get done if senior stakeholders are not getting clear and concise information on the scale and nature of required work. It has to be in context of all the other organizational priorities and stakeholders you depend upon for input.

This informs a justification for required exceptions from specified compliance benchmarks or clarity about required spend and trade-offs for non-negotiable requirements.

Stuart Coulson | Manager of Business Engagement | @SPCoulson

Compliance does not equal security. Security does not equal secure. Compliance demonstrates a minimum standard to compliance, while security shows the process of implementing controls for compliance and perhaps even a step beyond the level set by the standards. However, “secure” means being able to mitigate attacks.

Caryll Arcales | Global Security Specialist

Communication is the key. This is especially true when it comes to closing the gap between compliance and security. Teams need to collaborate with each other to align cybersecurity with compliance. This should be supported by management. Good management can contribute by ensuring that there’s efficient communication.

How do you get your business to buy into cybersecurity projects?

Stuart Coulson | Manager of Business Engagement | @SPCoulson

If you are hitting a barrier of budget for your security controls, then you probably are experiencing a disconnect between your IT Security strategy, the risks the organisation faces, and how you will mitigate those risks. Start by working with the risk owners to identify their real-world issues, then identify the technical controls that will resolve fully those risks. Ensure compliance to standards for your controls and then create a holistic strategy based around those controls.

If you try and do it the other way around, then you will not be directly addressing the issues of the users and key stakeholders. All too often, vendors will sell the dream that they can solve all your woes, but rarely is that the case. Ensure you create a list that addresses risks, and mitigate those. Sure, keep an eye to the future, but if you are just starting out, be led by your risks.

Gary Hibberd | Professor of Communicating Cyber | @AgenciGary

You have to change the conversation and make it about adding value. The challenge is that cybersecurity is often seen as a cost centre or something that slows down innovation or business processes. But if we can change the narrative, then securing the budget won’t be such a challenge. We, as cybersecurity professionals, need to become better at listening to the business and its needs. By doing so, we can better understand business objectives and their direction and see how we can help on this journey.

By focusing on the people around the boardroom table and what they are trying to achieve, we can reframe what we do to support and help them. The CFO typically wants to save money, so show how spending on cybersecurity can be better targeted. The CEO will want to increase market value, so show them how good cybersecurity can protect brand reputation. The Sales Director will want to increase sales, so show them how they can use cybersecurity as a business differentiator and a competitive advantage.

 A lot of this is about education and becoming better at communicating the benefits of cybersecurity. Essentially, we must become better communicators of the benefits of what we do.

Dean Ferrando | SE Manager, EMEA at Tripwire | @deanferrando

The old adage of “it’s not if you will be breached, but when”, still stands true, and trying to cater for that scenario from the start should pay for itself in the long run. There are a lot more benefits for organisations to adopt a security approach such as removing the unexpected costs of compliance alterations when the mandated frameworks change.  When that occurs, organisations have to re-asses their entire estate to see if their scope / security configurations have changed. Obviously, any identified changes could add additional unexpected costs to the organisation. If an organisation adopts a security approach from the start, then as long as the estate is being constantly monitored and protected to a higher standard than the bare minimum framework, any framework changes would most probably be irrelevant, again, reducing the long-term cost to the organisation.

While security is more difficult than simply achieving compliance, our experts make it clear that a security-centric approach will yield greater benefits. Above all, demonstrable value is an important aspect to proving why compliance should be a passenger in the security vehicle. Security must be the driver.

To learn more, download the whitepaper “Mind the Cybersecurity Gap – Why Compliance Isn’t Enough.”

Mind the Cybersecurity Gap – Why Compliance Isn’t Enough from Tripwire

The post ” Compliance does not equal security: 7 cybersecurity experts share their insights” appeared first on TripWire

Source:TripWire – Joe Pettit

Tags: Cloud, Compliance, Critical Severity, Encryption, Finance, TripWire

Continue Reading

Previous Which Hole to Plug First? Solving Chronic Vulnerability Patching Overload
Next GitHub Says Recent Attack Involving Stolen OAuth Tokens Was “Highly Targeted”

More Stories

  • Critical Vulnerability
  • Cyber Attacks

Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

8 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Malware

Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware

14 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

16 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Vulnerabilities

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

1 day ago [email protected] (The Hacker News)

Recent Posts

  • Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits
  • TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
  • Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks
  • AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion
  • We Are At War

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT