No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

The CISO’s Journey From Digital Defender to Compliance Champion

Navigating the nexus of cybersecurity, global regulation & operational resilience

by Frank Balonis
October 8, 2024
in Cybersecurity
lego figures going on journey

Increasingly, companies are looking for chief information security officers (CISOs) with expertise not only in the technical aspects of the role but in regulation and risk management. Frank Balonis, CISO at tech company Kiteworks, recaps the CISOs journey and looks at what the future holds.

The role of the chief information security officer (CISO) is shifting dramatically as emerging threats, technological advancements and complex regulations redefine the cybersecurity landscape. No longer limited to safeguarding digital assets, CISOs now play a pivotal role in aligning security with global compliance standards. This evolution demands a strategic, proactive approach to risk management and continuous security improvement, positioning the CISO as a key driver of operational resilience in today’s ever-changing environment.

With over 160 privacy laws enacted globally, CISOs face the daunting task of navigating varied regulatory requirements, making compliance a critical component of their strategy. Successfully managing these challenges not only safeguards an organization’s data but also enhances its reputation and trustworthiness in the marketplace.

The modern CISO is tasked with integrating a wide range of regulatory frameworks and compliance requirements into the organization’s broader risk management strategy, including standards like GDPR, HIPAA and ISO/IEC 27001.

The demand for CISOs to develop expertise in both technical and regulatory domains is growing, as highlighted in the ISACA Privacy in Practice 2024 report, which underscores the challenges of balancing these dual roles amid an environment of constrained resources and rising regulatory expectations. In this expanded role, CISOs are not just defenders against cyber threats but also champions of compliance and operational resilience.

Managing third-party risks: A critical imperative

One of the core responsibilities of today’s CISOs is protecting sensitive content from unauthorized access and breaches. As data breaches become more sophisticated, CISOs must implement comprehensive data governance frameworks that include strong encryption, access controls and data loss prevention strategies. This involves identifying sensitive data within the organization, understanding how it flows across various systems and networks and ensuring that adequate protections are in place at every stage. By focusing on protecting sensitive content, CISOs not only mitigate the risk of breaches but also ensure compliance with regulatory requirements that mandate stringent data protection measures.

According to Kiteworks’ recent report, 57% of organizations cannot track, control and report on external content sends and shares, highlighting a substantial governance risk gap. This inability to maintain visibility over third-party interactions poses a severe challenge to compliance and security, as sensitive data often moves beyond the direct control of the organization.

The increasing reliance on third-party vendors, partners and service providers to achieve business objectives has exponentially expanded the risk associated with these external entities, especially concerning the handling of sensitive data. Recent high-profile breaches involving third-party solutions have underscored the vulnerabilities inherent in relying on external partners for critical operations.

Adding to this complexity, per a Verizon report, 68% of data breaches are connected to third-party vulnerabilities, emphasizing the critical need for CISOs to oversee third-party risks as part of their compliance and security strategies. The significant rise in third-party-related breaches underscores the importance of comprehensive third-party risk management frameworks. These frameworks should include rigorous vetting processes, continuous monitoring and regular audits to ensure that third-party partners adhere to the organization’s security standards and regulatory requirements.

digital technology concept
Cybersecurity

Navigating the SEC’s 8-K Reporting Mandate: Cybersecurity Challenges & Compliance Realities

by Bill McLaughlin
September 4, 2024

The SEC’s cybersecurity disclosure rules recently turned one year old, but many organizations still have questions about compliance. Bill McLaughlin, president of Thrive, a managed services provider, explores some of the lingering issues.

Read moreDetails

Intersection of security and compliance

Continuous security improvement is not only crucial for protecting against threats but also serves as a vital support mechanism for compliance efforts. By continuously monitoring and adapting security measures, organizations can ensure they are meeting the dynamic requirements of various regulatory standards. This proactive stance helps organizations stay ahead of potential compliance issues, reducing the risk of penalties and enhancing overall governance.

Maintaining compliance across multiple global standards is a significant challenge due to the often-conflicting requirements of regulations like GDPR, CCPA and ISO/IEC 27001. Continuous security improvement helps bridge these gaps by fostering an integrated approach that aligns security protocols with compliance mandates. This ensures that organizations can address overlapping requirements more efficiently and reduce redundancies.

CISOs play a pivotal role in leading a security-first cultural change, ensuring that all staff members understand the importance of cybersecurity and their role in upholding the organization’s security posture. Implementing comprehensive training and awareness programs is essential for enhancing compliance and security. These programs should be designed to educate employees on current security threats, proper data handling procedures and the importance of adhering to regulatory requirements.

Future outlook: The evolving challenges and opportunities

As the regulatory landscape continues to expand, the role of the CISO is set to become even more critical in navigating complex compliance requirements, managing emerging cybersecurity threats and protecting sensitive content. The future will see CISOs increasingly adopting new technologies like generative AI to enhance both security and compliance strategies. Emerging trends in cybersecurity, including zero-trust architectures and enhanced data privacy measures, will require CISOs to continuously innovate and adapt their strategies to protect sensitive information. This evolving environment presents an opportunity for CISOs to lead the integration of advanced technologies, drive digital transformation and foster a culture of security, compliance and data protection across their organizations.

As threats grow more sophisticated and regulatory demands intensify, CISOs must take decisive action, making continuous security improvement and compliance management central to their strategies. A proactive, integrated approach is essential, leveraging emerging technologies and fostering a security-first culture to effectively manage risks. By stepping into their expanded roles with vision and agility, CISOs can drive innovation, strengthen operational resilience and build lasting trust with stakeholders. Now is the time for CISOs to lead with purpose, ensuring their organizations stay secure and compliant in an ever-shifting digital environment. 


Tags: Risk Assessment
Previous Post

Middle Management and Entry-Level Employees: The Heart of Ethical Execution

Next Post

Former Regulator’s Advice on Implementing New DOJ Guidance

Frank Balonis

Frank Balonis

Frank Balonis is chief information security officer and senior VP of operations and support at Kiteworks, with more than 20 years of experience in IT support and services. Since joining Kiteworks in 2003, Balonis has overseen technical support, customer success, corporate IT, security and compliance, collaborating with product and engineering teams. He holds a Certified Information Systems Security Professional (CISSP) certification and served in the U.S. Navy.

Related Posts

shipping medical supplies

How Life Sciences Companies Can Mitigate the Impact of US Tariffs

by Allison Raley and Mike Burke
September 2, 2025

Compliance professionals uniquely positioned to adapt & respond to tariff pressures

4 pillars on building

4 Pillars for Effective Trade Risk Management Amid Tariff Uncertainty

by Gareth Lake
August 29, 2025

Challenges extend far beyond accounting

business in trouble

‘Distress’ Is in the Eye of the Beholder: A Strategic Guide for In-House Deal Teams

by Zev Shechtman
August 4, 2025

Aversion to complexity dissuades many potential investors

chess strategy

Regulatory Pullback Amplifies Need for Strategic Risk Controls

by Elizaveta Egorova, Melanie Standish and Jonathan Roberts
July 8, 2025

Deregulatory environments can mask growing hidden risks from shareholder litigation to reputational damage

Next Post
doj building sign

Former Regulator’s Advice on Implementing New DOJ Guidance

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights