No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Compliance

Simplifying Compliance with an Inside-Out Security Mode

Rethinking Security Strategy to Maintain Agility

by John Clark
November 18, 2019
in Compliance, Featured
light bulb with tangled cord next to illuminated light bulb with straight cord

Shifting from an “outside-in” to an “inside-out” security strategy enables an organization to adapt readily to an ever-changing regulatory landscape – despite resource constraints. Optiv’s John Clark discusses.

The adoption of the General Data Protection Regulation (GDPR) in April 2016 initiated a worldwide debate over consumer data privacy rights and regulations. More than three years later and 18 months since GDPR’s enactment on May 25, 2018, and data privacy is still an issue dominating discussions at the consumer, corporate and political levels.

In the U.S., states have spearheaded the data privacy movement, but we’re starting to see activity at the federal level as well, with Congress investigating ways to implement a national data privacy standard. Perhaps the most well-known state law is the California Consumer Privacy Act (CCPA), which will go into effect in 2020. The CCPA, which adopts many of the same principles as GDPR, is on track to become the nation’s most comprehensive data privacy act. Taking California’s lead, other states (such as Nevada and Maine) have also introduced their own privacy regulation.

While new legislation is necessary to advance consumers’ privacy rights, it also adds to the already extensive list of federal, state and industry data protection laws by which companies must abide. Which begs the question: Would corporate compliance officers and security teams prefer a single, comprehensive privacy regulation rather than trying to comply with numerous more targeted regulations?

Optiv Security recently released its “State of the CISO” research report, which asked a very similar question to 100 U.S. CISOs or senior security personnel with equivalent responsibilities. When asked what impact a GDPR-like regulation would have on their business, more than half of survey respondents (57 percent) said they believe having one privacy law across industries and states would mean fewer individual regulations to track. Additionally, 19 percent of respondents stated that their company is close to being or already is GDPR compliant, so complying with a law of this nature would not be a major undertaking. Only 24 percent said they believe this kind of nationwide regulation would be too expensive and complicated to implement.

Also of note, Optiv’s State of the CISO survey asked respondents if it would be worthwhile to have a global agreement on cybersecurity, similar to the Geneva Convention, where countries agree to a set of principles governing their conduct on the internet. A whopping 88 percent said yes, it would set guardrails for acceptable online activities and decrease damaging behavior. Only 12 percent said no, because even if you could get offending countries to sign the treaty, they would break it.

Simplifying Compliance

While these survey results demonstrate that many security professionals would prefer to follow one comprehensive national or global data privacy law, the reality today is that organizations are on the hook to abide by a multitude of state, federal and industry data protection regulations. And, for many companies, this is a tough task – especially with today’s complex IT infrastructures and severe cybersecurity skills shortage.

Simplifying compliance despite dynamic infrastructures, limited security resources and ever-evolving regulations is possible. It just requires a change in security strategy, from “outside-in” to  “inside-out.” Let me explain.

Many organizations are operating with an “outside-in” security model, which allows external threats and compliance mandates to dictate security strategy and spend. From a compliance perspective, this means companies are often treating the latest and greatest regulation as their entire security framework. In other words, companies will focus all of their efforts on making sure they are compliant with a single mandate or law while neglecting the broader risk environment. This introduces compliance gaps in other areas of the business and leaves the organization vulnerable to data breaches. Individual compliance regulations and laws are not designed to be a complete security framework and should not be treated as such (in fact, sometimes regulations do not use security best practices in their mandates, which actually puts security and compliance at odds).

Rather than letting the external threat and compliance landscape dictate security strategy and spend, organizations would be better served adopting an “inside-out” approach to security and compliance, where business-specific risk and business objectives dictate the security framework. This model starts with a comprehensive risk assessment, which includes a compliance gap analysis, along with an evaluation of the data and assets that are most likely to be targeted, who is most likely to target them and how they are likely to do it. Based on the assessment findings, security and compliance teams can develop a strategic security strategy based on their organization’s unique risk profile.

Because inside-out puts the focus on the organization’s unique business risk rather than one particular regulation or threat, security and compliance teams can prioritize risk and make intelligent decisions around infrastructure, technology and operations. This means organizations can streamline their environments, implement stronger security processes and ensure compliance with relevant regulations.

A Single Strategy for Managing Many Mandates

The data privacy issue isn’t going away anytime soon, and we’re likely to see continued legislative activity at both the state and federal levels. The beauty of adopting an inside-out security model is that it no longer matters how the compliance environment changes, because regulations will become a subset of the overall security strategy and architecture. This makes organizations more agile, secure and compliant – and that delivers tremendous benefits to companies and their customers alike.


Tags: California Consumer Privacy Act (CCPA)GDPR
Previous Post

Enterprise Risk 2020: Are We Ready for Security 4.0?

Next Post

Diligent Institute Report: Director Views on Priorities and Society

John Clark

John Clark

John Clark is Executive Director, Office of the CISO/Risk Advisory at Optiv. John an information security professional with over 20 years of experience in various industry sectors including legal firms, financial services, utility companies and technology service providers. At Optiv, Clark leverages his experience and passion to help organizations build and improve business-focused security strategies and programs.

Related Posts

gdpr

UK Resurrects Data Protection Reforms, EU Court Rules on GDPR in Civil Cases

by Jonathan Armstrong and André Bywater
March 15, 2023

Recent courtroom and legislative action in Europe will likely have ripple effects around the world for companies subject to regulations...

eu flag

Preparing Your Company for the Latest GDPR Data Transfer Developments & Upcoming Deadlines

by Kevin L. Coy
November 30, 2022

An EU court decision and legislative moves in the U.S. and UK make compliance with privacy regulations increasingly difficult. Arnall...

minidata_b

Honey, I Shrunk the Data: How to Keep Customer Info on a Need-to-Know Basis

by Parker Poe
November 30, 2022

It may be tempting to hoard the data you have gathered on your customers, but an increasing number of regulations...

uk ico data access

UK’s Data Protection Regulator Signals Crackdown on Access Request Violations

by Jonathan Armstrong and André Bywater
October 5, 2022

Data privacy laws in the EU and UK established the right of individuals to find out what personal information organizations...

Next Post
Diligent Institute Report: Director Views on Priorities and Society

Diligent Institute Report: Director Views on Priorities and Society

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT