No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • Artificial Intelligence (AI)
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

5 Structural Barriers Breaking Your Cybersecurity Compliance Framework

Compliance challenges rarely stem from a lack of intent, but are often rooted in how systems and processes are designed.

by Steve Durbin
April 30, 2026
in Cybersecurity
barrier on track

The web of cybersecurity compliance organizations must navigate along with gaps between compliance framework design and effectiveness — among other stumbling blocks — can be serious barriers to effective risk management, says Steve Durbin, CEO of Information Security Forum. Overcoming these challenges begins by honestly auditing your current framework.

Talk to any CISO or cybersecurity leader about whether they are having compliance issues and they will resoundingly answer with a big “no.” The reality is that many organizations suffer from a compliance problem they may not be fully aware of.

Research from Creditsafe blamed general business pressures for driving companies to cut compliance corners. A striking 59% of 200 US professionals across accounting, legal, supply chain and consulting said they “always” compromise on compliance; 79% admitted to skipping compliance checks on customers and suppliers due to familiarity. Violations are on the rise — 67% reported more data privacy breaches, while 64% noted increased financial accounting and tax compliance violations.

Proper governance frameworks are without a doubt in place, and associated documentation exists. Policies and control standards might pass a cursory audit. The problem is that many organizations won’t be able to demonstrate in absolute terms whether their controls are working. You will be surprised how common this is. This happens because the compliance framework has structural issues.

Structural gaps occur because the technological environments in which organizations operate necessitate cross-jurisdictional regulations. They don’t have to comply with just one or two regulatory frameworks but with multiple frameworks, such as NIS2, DORA, HIPAA, SEC disclosure rules and others relevant to their industry and geography. Consequently, an organization’s capacity to manage compliance is failing to keep pace with the growing complexity of compliance demands.

Structural barriers impacting effective compliance

Compliance challenges rarely stem from a lack of intent. They are often rooted in how systems and processes are designed. To understand why gaps persist, it’s important to examine five structural barriers that limit effective compliance.

Fragmentation

A mix of compliance controls forms the frameworks of multinationals. An organization operating in the EU has to comply with GDPR, but the same organization with a footprint in the US must also comply with SOC 2. The organization might also have to comply with the NIST cybersecurity framework or industry-specific mandates like HIPAA and SOX. Controls across regions overlap, and the same control can get documented, evaluated and reported in multiple ways. This results in duplication of effort and inconsistent interpretation. The fix here is to swear by a harmonized control work, in which a unified reference point satisfies multiple regulatory regimes.

Language

Many organizations underestimate the power of language to create structural weaknesses in their compliance framework. Language, in this case, doesn’t mean English, French or Spanish. Language refers to how a security framework has been documented. 

Traditionally, such documents were only for security professionals, but as the security footprint broadened and ownership extended into operations (finance, legal and business units), the security frameworks needed to be interpreted by key stakeholders. A framework that is only understood by a security engineer will ultimately face poor implementation. Governance documentation should be written in plain language that every stakeholder can understand.

hacker penetrating system
Cybersecurity

How to Reassure Stakeholders When Facts Are Still Unknown During Cyber Incidents

by Jena Valdetero, Wouter van Wengen, Jonah Pitkowsky, Lily Williams and Jamie Singer
December 22, 2025

Scenario planning and coordination between legal and communications experts allows organizations to build adaptable messaging

Read moreDetails

Design and effectiveness gap

As the saying goes, there’s many a slip ’twixt the cup and the lip. The same is true for governance controls. Huge gaps can form between design and function. Regulators are becoming more explicit about the design’s workability. 

For instance, NIS2 not only asks whether a set of controls is implemented, but it also demands proof that these controls are functioning as intended on an ongoing basis. This cannot happen without structured metrics mapped to specific control objectives. These objectives may be the percentage of critical vulnerabilities remediated or the number of unpatched critical vulnerabilities over time among others.

It’s simple: If a control cannot be measured, how can you depend on it for risk management?

Proportionality

A one-size-fits-all compliance framework will be counterproductive. A low-risk environment will see deployment of controls, processes or safeguards that are needlessly complex or stricter than the actual risk justifies. On the other hand, high-risk environments will see under-engineering, weakening their cybersecurity posture. 

Modular design, starting with a baseline of core controls, followed by progressively rigorous requirements for high-risk environments, is the way forward. This also matters as new domains emerge. AI, operational technology and post-quantum cryptography are introducing control requirements that existing frameworks are still catching up with. A modular architecture makes it possible to add new domains without tearing down what already exists.

Culture

Verizon reports that about 60% of breaches feature a human element. A lack of genuine human buy-in can lead to gaps in cybersecurity posture, regardless of the sophistication, scope or scale of controls.

Lest we forget, security controls are owned and run by people, and it is these individuals who should best understand them and immediately flag concerns when they feel something is amiss. Culture and technical design working in tandem will help ensure a robust compliance framework.

The roadmap toward improved compliance

To improve compliance, begin by honestly auditing your current framework, identifying overlaps, inconsistencies and gaps. This will help identify fragmentation and set the stage for building a more harmonized compliance framework by preventing duplication and creating a master reference mapping to all relevant standards. 

But this won’t deliver value without rewriting governance documentation for a business audience, especially those who own controls. The point is to remove inconsistencies. 

Implementation without metrics lacks direction and impact. Define ideal performance, evidence and which thresholds signal the most problems. Lastly, think of all compliance output as risk intelligence that helps identify gaps in the framework, allowing for quick remediation.

With effective compliance, you are not just satisfying a regulator but managing your risks. Don’t treat compliance as a periodic obligation but as an effective mechanism for understanding, measuring and managing cyber risk. Compliance as a destination is not as important as the journey that helps you get there.

Tags: Cyber Risk
Previous Post

Responsible AI Governance Starts With Ownership

Next Post

GCs Say Global Conflicts Are Increasing Enterprise Risk

Steve Durbin

Steve Durbin

Steve Durbin is CEO of the Information Security Forum, an independent association dedicated to investigating, clarifying and resolving key issues in information security and risk management by developing best practice methodologies, processes and solutions that meet the business needs of its members.

Related Posts

bug bounty concept

Who’s Really to Blame When a White Hat Goes Gray?

by Vera Cherepanova
April 22, 2026

Coordinated disclosure is a three-cornered relationship; when the company-researcher part collapses, the user is the one left exposed

scam alerts rampant

US Targeting TCOs’ Role in ‘Scam Centers’

by John Carlin, Roberto Gonzalez, Ian Richardson and Sam Kleiner
March 31, 2026

Companies in banking, social media, fintech and telecommunications will have opportunity to coordinate with feds

news roundup_june 14 2024

US Regulatory Fines Plummet in 2025

by Staff and Wire Reports
March 19, 2026

Majority of orgs report breach involving AI

news roundup header image papers

DEI, Immigration Top Employer Concerns in Trump’s Second Term

by Staff and Wire Reports
March 5, 2026

Majority of SMBs rank cyberattacks as biggest business risk

Next Post
news roundup bundled papers

GCs Say Global Conflicts Are Increasing Enterprise Risk

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2026 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • Artificial Intelligence (AI)
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2026 Corporate Compliance Insights