No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

5 Reasons Why Compliance Alone Is Not Efficient at Reducing Cyber Risks

Meeting the letter of the law doesn’t necessarily mean lowering risk

by Stu Sjouwerman
June 8, 2022
in Cybersecurity
compliance cyber risk titanic

Understandably, most businesses prioritize compliance when it comes to security risks. But as KnowBe4 CEO Stu Sjouwerman explains, a compliance mindset can create a false sense of security in the world of cyber threats.

Compliance is an ongoing business concern, especially in the world of cybersecurity. Compliance is actually the biggest driver (59 percent) of the identification of an organization’s security needs instead of business risk reduction. This is probably because an increasing number of regulatory bodies mandate that organizations abide by security standards like GDPR, HIPAA and SOX. 

Organizations spend large amounts of money, time and resources trying to meet audit requirements, and when they successfully meet criteria and pass tests, they often get a false sense of security that they are battle-ready against real-world cyber threats. Unfortunately, this is far from true. 

Compliance is only a small part of cybersecurity, and there are many reasons why compliance is inefficient in reducing cyber risks. 

1. Compliance is an audit mentality

When the unsinkable Titanic sank in 1912, it was fully compliant with all marine regulations. In fact, it exceeded the number of lifeboats mandated by the British Board of Trade at the time. But when catastrophe struck, the ship was not equipped with enough lifeboats to save all passengers on board. The problem? Management, too focused on meeting compliance, undermined real-world risks. Cybersecurity compliance too is a lot like that. There’s a compliance document where every checkmark becomes as valuable as the next checkmark. Security teams develop a kind of checkmark mentality because the end goal is not to be secure but to be compliant. 

2. When compliance conflicts with security, compliance always wins

In many cases, especially with enterprises, the C-suite is responsible for making sure the company meets its compliance requirements. Leadership often does not want to hear about any deviating from those requirements for the sake of security. That’s because oftentimes they’re legally obligated to meet those compliance requirements. For example, a business that operates in a fully cloud, perimeter-less environment might need zero-trust more than a firewall. Yet some businesses might still be obligated to have a firewall in place (even though it’s not needed), to meet legislative requirements. 

3. Compliance controls are not ranked for risk relevance

Compliance documents view risk as bubbles in a glass of champagne. They fail to inform security teams that two or three of those bubbles are much larger than all the other bubbles put together. For example, phishing and unpatched vulnerabilities are one of the top root causes of all cyber attacks but most compliance documents fail to highlight or prioritize those risks. 

4. Compliance is binary

Auditors will typically ask yes/no questions, such as whether the organization conducts software updates and backups and has firewalls. In case there is a minor deviation, auditors view it only as an exception or a failure because they can check only for a yes or no response. In reality, security isn’t binary. It generally falls along a spectrum of continuum — from no security to all possible security.

5. Compliance documents do not provide enough detail

Most compliance documents fail to set clear expectations and define clear guidelines. For example, compliance documents might say, “One should apply critical patches in a timely manner.” But what does “in a timely manner” mean? What is a critical patch? Or, “One should collect reviews and logs.” Which logs? What type of review? “One should back-up data and regularly test it.” Test in what way?  

Since such details are not clearly defined, it creates a lot of confusion. In the end, everyone knows (including the auditor) that the audit isn’t very accurate. Saying “We are fully compliant with patching” literally means nothing. One might end up patching 15,000 things that never got attacked but end up missing out on patching the five riskiest applications and still be compliant with vague statements. 

How businesses can achieve compliance and risk reduction at the same time

Bottom line, businesses need to put risk ahead of compliance, as compliance doesn’t always lead to adequate security. Start with risks and vulnerabilities in the order of their importance: exploits actively being used against you, exploits likely to be used against you in the near future and exploits that were successfully used against you in the recent past. Use a vulnerability scoring system (such as the CVSS) to rank your risks. 

Less than a handful of threats comprise the vast majority of real risks. Focus on the root causes of exploitation, such as social engineering and unpatched software. Start by patching internet-facing applications (browser, OS, productivity apps, browser and add-ons). Where compliance conflicts with security, invest in education and set clear expectations. Discuss with management about the differences between compliance and security, explain why security should win and agree how compliance expectations will be handled. 

Since compliance and risk management go hand in hand, it might also be a good idea to leverage GRC (governance, risk and compliance) platforms, as these can help track your compliance progress, drive mitigations against the most likely risks and monitor changes in controls over time. 

Compliance is not an obligation but an opportunity. Organizations that recognize this and live everyday like it’s Audit Day will not only fare better at compliance but also achieve real reduction in cyber risks. 


Tags: Cyber Risk
Previous Post

How Can Outside Counsel Sidestep Ethical Pitfalls in Internal Investigations of Antitrust Wrongdoing?

Next Post

Survey: Majority Admit Missing Key Piece of HIPAA Compliance

Stu Sjouwerman

Stu Sjouwerman

SjouwermanStu Sjouwerman is founder and CEO of KnowBe4 [NASDAQ: KNBE], developer of security awareness training and simulated phishing platforms, with 41,000 customers and more than 25 million users. He was co-founder of Sunbelt Software, the anti-malware software company acquired in 2010. He is the author of four books, including “Cyberheist: The Biggest Financial Threat Facing American Businesses.” He can be reached at ssjouwerman@knowbe4.com.

Related Posts

news roundup green bars

In-House Counsel Salary Increases Slow

by Staff and Wire Reports
May 2, 2025

Majority of execs predict rise in fincrime in ’25

data abstract green purple

66% of CISOs Worry Cyber Threats Are More Advanced Than Companies’ Defenses

by Staff and Wire Reports
April 25, 2025

US business sector falling behind in adoption of renewable energy

robot hand pointing to sky

Agentic AI Can Be Force Multiplier — for Criminals, Too

by Steve Durbin
April 21, 2025

How polymorphic malware and synthetic identities are creating unprecedented attack vectors

data abstract pixelated

GenAI Adoption Surging in Professional Services

by Staff and Wire Reports
April 18, 2025

Fewer than 1 in 3 organizations consistently meet cyber compliance standards

Next Post
medical records hipaa

Survey: Majority Admit Missing Key Piece of HIPAA Compliance

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights