No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Paper Tigers Won’t Protect You: The Reality of Effective NIS2 Compliance

Why Belgium's early adoption model could prevent another round of ‘compliance theater’ across Europe

by Hans Kayaert
March 24, 2025
in Cybersecurity, Opinion
origami tiger

With most EU member states slow-rolling NIS2 implementation, organizations face uncertainty about compliance requirements while simultaneously addressing growing cybersecurity demands from customers and investors. Hans Kayaert, general counsel at Aikido Security, cuts through the fog of compliance theater to expose the significant disconnect between legal teams churning out paperwork and the technical experts who must translate bureaucratic jargon into actual security measures.

Uncertainty — not ideal for compliance, but that’s how I’d describe the landscape for NIS2 implementation across Europe. Local implementations have been stalled or delayed in most member states — with one notable exception. Belgium has taken a tough position, but there’s a silver lining: What the Belgians have implemented is essentially a copy of the ISO 27001 standard.

This matters because ISO 27001 is fundamentally voluntary, and NIS2 simply makes this obligatory. Belgium’s early adoption, while seemingly severe, is actually helping to create a good level of standardization that other member states could — and should — follow.

The paper tiger problem

Why all the panic? Well, we’ve seen this before. I was in the trenches when GDPR hit Europe, and all I saw in response was what I like to call “papering up,” a generic reaction that involved an avalanche of policies and documents. A whole industry was doing a lot of busy work around legal policies that, in the absence of actually talking with the technical side, just felt like smoke and mirrors.

With NIS2, the legal and compliance consulting industry do exactly the same thing. I’ve seen plenty of ads from legal tech companies doing AI — and suddenly they’re all talking about policy documents for the Cyber Resilience Act, which entered into force in December, when it’s just about making sure your code isn’t vulnerable and fixing issues when they happen.

The easy part is making paper tigers. What actually matters is having conversations with the people who are, let’s say, two or three levels down in the organization, the ones actually looking at the software.

neon handshake sign
Cybersecurity

Why CISOs and Boards Must Speak the Same Language on Cybersecurity

by Monica Landen
February 4, 2025

Translating cyber risks into boardroom terms is essential for resilience

Read moreDetails

Enterprise has it hardest

The reality gets more complex when we look at larger enterprises. While a startup might have just one piece of software to worry about, larger companies are often the consequence of mergers and acquisitions, and these legacy software applications come along for the ride. What you end up with isn’t just one piece of software; with a large enterprise, you often see dozens of pieces of software that need to be secured and monitored.

This complexity often leads to what I call “compliance theater,” with companies waving around certifications that only apply to a cherry-picked combination of repositories or cloud configurations. They basically just certify a tiny bit of it. 

This is particularly relevant in M&A situations — we’re seeing this becoming part of standard due diligence now. For instance, private equity groups that are buying software companies are running security scans of their targets’ whole infrastructure and source code as part of their due diligence process. It makes sense: If part of M&A due diligence is legal due diligence, you need to jump from lawyers looking at policy documents to actually understanding the technical side.

The communication gap

A core challenge is communication. When a compliance requirement like NIS2 comes in, it typically lands first with legal teams and chief information security officers who are far away from the actual understanding of what vulnerability means.

What happens next is that the conversation needs to trickle down to those people who actually understand the technical reality. That’s where things start breaking down; people start talking different languages because it gets technical. The compliance people need reports that map to their frameworks and language, while the technical people need to see what needs fixing.

How to move forward (practically)

What’s the practical way forward? If you already have ISO 27001 certification, you’re basically good to go — unless you’re running nuclear power plants or other critical infrastructure. We need to stop panicking about NIS2 and think about practical implementations that create real security improvements.

Take the supply chain requirements, for example. Instead of just pushing paperwork down the chain, organizations can require vendors to be transparent about their security posture and incident response times. We’re seeing this approach work well because it establishes trust through demonstration rather than documentation. Trust in traditional certifications like SOC 2 is diminishing; what matters now is having actual evidence of security in practice.

At some point, we need to move beyond the approach where people make money on the lawyer-elite compliance side without furthering the objective of the regulation, which is to improve security. This means establishing some sort of standardized approach that focuses on practical implementation rather than just documentation.

If you’re not well-organized in dealing with these requests coming in, you may lose trust and you may lose revenue or renewals because you are not able to establish trust with your clients. That’s your top-line problem.

Then on the development side, if you enforce these vulnerability measures ineffectively, you will drown your developers with false positives, which is a drain on time. That’s more than just an expense issue: Those developers typically make software that is critical to your growth. This is hitting home, from impacting trust at the sales side to hampering the innovation capabilities of your company.


Tags: GDPR
Previous Post

Change Is in the Air: Answering the Call for a Hero

Next Post

The AI Regulation Pendulum Swings: Innovation vs. Privacy Protection

Hans Kayaert

Hans Kayaert

Hans Kayaert is general counsel at Aikido Security, an application security platform.

Related Posts

examining data on laptop screen

Privacy Rights Surge Forces Rethink of Data Management

by Gal Ringel
March 14, 2025

As global privacy regulations multiply, organizations face mounting pressure to efficiently respond to data subject requests amid complex data environments

gdpr website screenshot

In the World of JavaScript, GDPR Consent Forms Merely Scratching the Surface

by Rui Ribeiro
December 16, 2024

Consent forms alone don’t mean much when consumers are so tired of checking boxes they don’t even read the policies

us map black and white

Minnesota Latest State to OK Consumer Data Privacy Law

by Amanda Novak
August 26, 2024

Measure set to go into effect for most covered entities next summer

eu flag behind security cameras

EU AI Act Elevates Responsible Standards, Outpacing GDPR

by Karen Schuler
August 14, 2024

Rigid guidelines to impact deployment and innovation of AI on a global scale

Next Post
pendulum swinging concept

The AI Regulation Pendulum Swings: Innovation vs. Privacy Protection

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights