Ensuring sustainable compliance and security

1 May 2014 Security Services & Risk Management

Considering the complexity and scope of today’s regulatory environment, compliance has become a key corporate initiative that cannot be ignored. Coupled with the rise in security threats, organisations are now searching for a more effective, sustainable and scalable approach to achieve their compliance objectives while improving the overall security of the organisation.

NETCB CEO Cobus Burgers says the challenge of building an effective compliance programme is more daunting than ever before. “Especially one that helps meet one’s compliance, security and business objectives simultaneously. The task of complying with scores of overlapping regulatory and industry mandates, often with the same set of IT resources, is time-consuming and complex.”

Too often, overwhelmed security teams revert to an 'accredit and forget it' mind-set, allowing a minimal set of audit criteria to drive their security priorities, rather than focusing on managing risk in alignment with the risk tolerance and business objectives of the organisation. In addition to the pressures of meeting multiple mandates and ensuring that the security budget is effectively utilised, organisations today are faced with a rapidly evolving threat landscape.

As new business models such as outsourcing and cloud computing make the network perimeter more fluid and financially or politically motivated, organisations must rapidly develop security programme maturity to avoid a breach.

Organisations must be able to effectively develop, implement and monitor appropriate security controls for their critical information and infrastructure, wherever it may be. They must recognise that the insiders who have access to this critical information may not be who they seem, and as a result, all activity must be monitored and no one can be completely trusted.

Burgers says in this complex and challenging environment, the single best way to achieve compliance is to get the security basics right. “First, implement and manage to a harmonised set of controls that meet one’s evolving regulatory and corporate mandates. As one implements these security controls, make certain that the solutions provide the level of automation required by the organisation.”

The automation of routine, labour-intensive tasks is critical to reducing the cost of compliance and avoiding ‘audit panic’ because it ensures a repeatable process and strict adherence to policy. Only an integrated, automated approach to compliance rooted in sound security principles is effective, sustainable and scalable – enabling executives to achieve their compliance objectives and improve the overall security posture of their organisation.

“In today’s complex regulatory environment, many organisations struggle to integrate regulatory compliance programmes with day-to-day security operations. This can lead to audit findings and data breaches that result in costly mitigation, or even fines and penalties,” he explains.

As compliance programs place ever-greater demands on IT resources, businesses are left urgently searching for a more effective, sustainable, and scalable approach that will achieve compliance objectives while improving the overall security posture of the organisation. Furthermore, security budgets continue to be driven by compliance. The mandatory nature of regulatory compliance, combined with specific and quantifiable penalties for non-compliance, has directed a large portion of overall security spending toward compliance efforts.

“It is hard to argue with this objective, because the goal of compliance spending is to protect corporate profitability and avoid increased costs from non-compliance and possible brand damage,” he adds. “However, when security projects are focused solely on meeting a minimal set of audit criteria rather than minimising risk, much of the potential benefit of this funding is wasted.”

The challenge for security teams is to ensure that security expenditures are directed toward a comprehensive risk mitigation program aligned to the risk tolerance and business objectives of the organisation.

The increased number of compliance mandates is driven in no small part by a growing public awareness of corporate malpractice and the risks of data theft. Regulatory and industry bodies have responded to public concern by mandating breach notification and imposing increasingly broad controls with more stringent penalties for non-compliance.

Furthermore, as organisations seek to enforce compliance standards across their businesses, they may impose additional or even contradictory goals on administrators and compliance officers in the process. “Many of today’s organisations are struggling to implement a sustainable compliance program that can address the full set of compliance mandates and adapt quickly as mandates evolve or new mandates are created,” he says.

External threats have evolved from individual hackers to sophisticated, organised groups motivated by financial and political gain. These attacks are often backed by the funding of international corporations, organised crime, and even governments. With this level of support, it is not surprising that security breaches are enabled by increasingly sophisticated technology and often assisted by someone on the inside.

Burgers says the insiders are bribed, coerced or even recruited specifically to join the organisation to steal sensitive information. “With this in mind, do you know if your team is prepared to defend against these sophisticated attacks, and do you know who in the organisation you can trust?”

IT security has not kept pace with evolving technology and business models. More importantly, staffing has become one of the largest expenses on the IT budget. In an effort to slow this growth and control costs, there has been constant pressure to outsource where possible, especially where specialised skill sets are required. In fact, it has been several years since the average organisation was staffed exclusively by true employees.

As a result, most organisations have policies and controls in place to support temporary staff, onsite partners, and even visitors. In the effort to control costs, what many organisations have failed to consider is that outsourcing tasks does not transfer responsibility. If the outsourcing partner fails to adhere to control objectives, the liability is still held by the organisation.

For more information contact NETCB, +27 (0)12 844 0744, [email protected], www.netcb.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
FICA in the era of deepfake and AI-driven fraud
Security Services & Risk Management
A growing fraud strategy involves leveraging AI to produce highly convincing fake images, videos, and audio, commonly referred to as deepfakes, which are used to impersonate real individuals and spread misleading or false information.

Read more...
Risk management and compliance enforcement
Security Services & Risk Management
Having a risk management and compliance programme (RMCP) is not just a procedural formality; it is a legal requirement under Section 42 of the Financial Intelligence Centre Act (FICA).

Read more...
The dangers of poor-quality solar cables
Security Services & Risk Management Smart Home Automation
Reports indicate that one in six fires attended by South African firefighters is linked to substandard solar installations, often due to faulty wiring or incompatible components.

Read more...
Growing risks for employers
Security Services & Risk Management
With South Africa’s unemployment rate exceeding 32% and expected to rise beyond 33% this year, desperation is fuelling deception in the job market. Trust is no longer a given, it is a gamble.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.