No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Focus on Cyber Resilience Fundamentals and Compliance Will Naturally Follow

Building a robust security foundation in an era of evolving regulations

by Christos Tulumba
October 29, 2024
in Cybersecurity
hand holding binoculars digital art collage

In today’s complex regulatory landscape, organizations must resist the urge to prioritize compliance over comprehensive cyber resilience. Christos Tulumba, CISO of Veritas Technologies, explores why focusing on fundamental security practices yields better results than a checkbox approach to meeting regulatory requirements.

Editor’s note: The author of this article is chief information security officer at Veritas Technologies, a data management provider.

The ever-evolving regulatory environment — from the Digital Operational Resilience Act (DORA) in the EU to the continued evolution of FedRAMP to numerous state-level data protection laws — has created a complex tapestry of compliance requirements. For many organizations, this has led to a scramble to tick checkboxes to meet specific criteria, often at the expense of a cohesive, overarching cyber resilience strategy.

This approach is short-sighted and dangerous. While compliance is crucial, it should be a natural outcome of robust cyber resilience practices, not the driving force behind them. As businesses navigate evolving regulations, it’s essential to remember that the fundamental principles of cyber resilience remain unchanged:

  • Comprehensive asset visibility and monitoring
  • Properly configured perimeter defenses
  • Strong security policies for things like passwords, the principle of least privilege and remote and personal device access
  • Robust backup and recovery capabilities
  • A security-centric culture through employee cybersecurity awareness
  • Test and rehearsal

As a chief information security officer, there are three elements on this list I see most often lacking at organizations: comprehensive asset visibility and monitoring, robust backup and recovery capabilities and security-centric culture.

Comprehensive asset visibility and monitoring

The first step in any effective cyber resilience strategy is knowing what needs protecting. This means having a complete inventory of all assets, from endpoints and servers to cloud resources and connected smart devices. But it’s not enough to simply have a list, organizations need real-time visibility into the status and behavior of these assets. Implementing a thorough asset discovery and monitoring strategy should include:

  • Automated discovery and classification of assets
  • Continuous monitoring for changes and anomalies
  • Integration with threat intelligence feeds for real-time risk assessment
  • Comprehensive logging and audit trails

By maintaining this level of visibility, an organization is not only better positioned to detect and respond to threats, but also demonstrate compliance with various regulatory requirements.

While the benefits of comprehensive asset visibility are clear, maintaining this visibility has become extremely challenging in today’s complex, hybrid IT environments. The modern organizational network is a dynamic ecosystem, constantly shifting and evolving, which presents several unique challenges for security teams.

One of the primary difficulties lies in managing cloud-based assets. Unlike traditional on-premises infrastructure, cloud resources can be spun up or down dynamically, often in a matter of minutes. While beneficial for business operations, this flexibility can create blind spots in asset monitoring. Traditional asset discovery tools might miss a virtual machine that exists for only a few hours yet could still present a significant security risk if compromised.

Shadow IT and other unauthorized assets represent another significant challenge. As employees increasingly adopt cloud-based tools and services without IT approval, organizations face the risk of data being stored or processed on systems outside their visibility and control. These unauthorized assets can create significant security vulnerabilities and compliance risks.

To address these challenges, organizations must implement multi-layered monitoring strategies that adapt to diverse IT landscapes. This might involve combining traditional asset discovery tools with cloud-native monitoring solutions, implementing network segmentation and using user and entity behavior analytics to detect unusual activity that could indicate shadow IT usage.

robot pressing keyboard enter key
Cybersecurity

Planning on Using AI for Security Compliance? Are You Sure You Don’t Just Need Automation?

by Shrav Mehta
June 17, 2024

Neither AI nor automation should be deployed without human oversight

Read moreDetails

Robust backup and recovery capabilities

With the alarming rise of ransomware, solid backup and recovery capabilities are perhaps the most important element of an effective cyber resilience strategy. It’s the last line of defense against attacks that increasingly try to lock organizations out of their data. And it goes far beyond simply having backups — it’s about ensuring backups are comprehensive, secure and quickly recoverable in a crisis.

Backing up data should follow the 3-2-1 best practice: keep at least three copies of data in different locations on at least two distinct storage mediums with at least one copy stored offsite and on immutable storage.

Arguably, even more important than backing up data and apps is the ability to recover them post cyber incident. All the backups in the world do no good if they can’t be quickly and fully recovered and restored. This requires frequent recovery rehearsals. Practice makes perfect.

A well-integrated approach to asset visibility and backup and recovery is essential for comprehensive cyber resilience. At its core, integration allows organizations to align their backup strategies with their most critical assets. Asset visibility tools provide a clear, real-time picture of an organization’s IT landscape, identifying and categorizing all devices, applications and data stores. This information is invaluable in shaping backup and recovery priorities. Instead of a one-size-fits-all approach, organizations can tailor their backup frequency, retention policies and recovery time objectives based on the criticality of each asset and regulatory requirements.

Many regulatory frameworks, such as the GDPR, require organizations to comprehensively understand their data assets and robust measures to protect this data. By combining backup and recovery with asset visibility, organizations can more easily demonstrate their compliance. They can show that they know what data they have, where it resides, how it’s protected and how quickly it can be recovered in case of an incident.

Fostering a security-centric culture

While robust technical measures are crucial, the human element of cyber resilience is equally critical. When leaders demonstrate that cyber resilience is a business imperative, not just an IT issue, it transforms how the entire organization approaches security. Taking a top-down approach includes regular cyber resilience briefings for executives, allocation of adequate resources and visible participation in security awareness activities.

Effective, ongoing communication is central to a cyber resilience-conscious culture. This involves transparent incident reporting; regular updates on new threats and protection measures; and clear, accessible security policies. Equally important is providing comprehensive security education tailored for different roles and departments, using both formal training and informal learning opportunities. Compliance significantly improves when employees understand not just the “what” but the “why” of cyber resilience measures.

For cyber resilience to truly become part of the organization’s DNA, it must be integrated into everyday business processes. This means including security considerations in project planning from the outset, making cyber resilience a key factor in vendor selection and management and regularly conducting and acting on security risk assessments. By fostering this robust cyber resilience culture, organizations can ensure that technical measures like those listed above are not just implemented, but are woven into the fabric of the organization, supporting compliance efforts and enhancing overall resilience.

In closing

Focusing solely on compliance checkboxes is tempting when facing today’s complex regulatory requirements. However, true cyber resilience comes from focusing on fundamental practices that enhance overall security posture, especially comprehensive asset visibility and monitoring, robust backup and recovery capabilities and fostering a security-centric culture. Remember, compliance should be a natural outcome of effective cyber resilience practices, not their primary driver.


Tags: Risk Assessment
Previous Post

Cyber Threats Are Evolving. Is Your Risk Management Strategy?

Next Post

What FDIC’s Cyber Overhaul Means for FIs of All Sizes

Christos Tulumba

Christos Tulumba

Christos Tulumba is the chief information security officer at Veritas Technologies.

Related Posts

ai policy

Planning Your AI Policy? Start Here.

by Bradford J. Kelley, Mike Skidgel and Alice Wang
May 7, 2025

Effective AI governance begins with clear policies that establish boundaries for workplace use. Bradford J. Kelley, Mike Skidgel and Alice...

business relationship concept hands

Relationship (Owner) Goals: Why Half Your TPRM Red Flags Stay Hidden

by Chris Audet
April 9, 2025

The front-line staff who manage vendor relationships are uniquely positioned to spot problems before they escalate, yet many organizations fail...

cute robot looking at financial volumes

AI’s Dual Role in FinServ Risk Management

by Nalini Priya Uppari
March 28, 2025

As technology evolves, so do the tools that help banks and investment firms maintain stability amid uncertainty

mineral mining operation

Why Critical Minerals Demand a Compliance Revolution

by Rebeca Vergara Gaona
February 11, 2025

Corporate compliance lessons could help strengthen intergovernmental mineral agreements before problems arise

Next Post
fdic building sign

What FDIC’s Cyber Overhaul Means for FIs of All Sizes

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights