{"id":316,"date":"2024-07-29T09:40:19","date_gmt":"2024-07-29T09:40:19","guid":{"rendered":"https:\/\/paarentingnation.com\/?p=316"},"modified":"2024-08-01T15:42:31","modified_gmt":"2024-08-01T15:42:31","slug":"emerging-issues-shaping-the-future-of-cyber-grc","status":"publish","type":"post","link":"https:\/\/paarentingnation.com\/index.php\/2024\/07\/29\/emerging-issues-shaping-the-future-of-cyber-grc\/","title":{"rendered":"Emerging Issues Shaping The Future Of Cyber GRC"},"content":{"rendered":"
As organisations become increasingly reliant on digital infrastructures, they are turning to the governance, risk management and compliance (GRC) model to ensure a comprehensive and integrated approach to cybersecurity. As a subset of GRC, the term \u201ccyber GRC\u201d reflects the policies in place to manage and reduce cybersecurity-specific risks, and the adherence to relevant standards, which encompass information security requirements, data privacy laws and industry-specific regulations.\u00a0<\/strong><\/p>\n For example, cyber GRC frameworks can be seen incorporating the regulatory requirements of the EU\u2019s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Organisations are also adopting NIST and ISO standards as part of their compliance initiatives. While adherence hardly guarantees a breach-proof cyber posture, these frameworks do provide the basis for security teams to handle things methodically. Once companies are audited by regulators, certifications likewise help instil confidence among customers and investors.<\/p>\n However, the growing prominence of cyber GRC presents CISOs with new challenges. Indeed, cyber GRC frameworks are by nature dynamic, due to the evolving threat landscape, use of new technologies, and regulatory shifts. It is therefore no easy task to ensure compliance over time.<\/p>\n >Here we\u2019ll take a look at issues that have been taking shape in recent years, changing what it means to keep up with the demands of cyber GRC.<\/p>\n Digitalisation has exposed today\u2019s businesses to a wide range of cyber threats: every modern organisation has the potential to become the victim of malware attacks, data theft, DDoS, and social engineering. However, every situation is different, and generic or \u201cone size fits all\u201d solutions don’t work. Every company has its own sets of circumstances, vulnerabilities, and attack predispositions. Different risk profiles call for specific frameworks to most effectively and efficiently manage threats.<\/p>\n What\u2019s more, not every organisation has the same compliance requisites. The differences in location and industry entail differences in regulations. For example, healthcare-related organisations serving US-based patients have to deal with the requirements of HIPAA. Organisations that only operate in Asia are not necessarily subject to the GDPR. Matrices of GRC frameworks have to be formulated according to the specific circumstances of an organisation and the applicable regulatory requirements.<\/p>\n Moreover, the threats affecting organisations continue evolving along with the compliance requirements. They are never constant, as they are influenced by various factors including technological advancement, the cunning ingenuity of threat actors, and changes in government policies.<\/p>\n These circumstances emphasise the need to customise security frameworks to match the unique requirements of every business. Generic GRC frameworks rarely deliver the intended benefits. Organisations that solely adopt frameworks created and used by other organisations are setting themselves up for an inevitable failure in cybersecurity.<\/p>\n Cypago<\/a>\u2019s cyber GRC automation solution can help security teams to formulate custom GRC frameworks through a platform that makes it easy to integrate security programs and controls. Automate the process of reconciling standards, regulations, and risk priorities to ensure comprehensive processes that specifically address the unique requirements of your organisation. Select the frameworks that apply to you, upload your custom requirements, and let the automation engine surface areas that call for mitigation, allowing you to remain audit-ready and compliant with applicable regulations \u2013 including your own.<\/p>\n Data is both an asset and a liability \u2013 it\u2019s crucial for informed decision-making and strategic planning, but it must be protected constantly to avoid leaks.<\/p>\n Organisations are compelled to maintain data privacy at all times. This is certainly a daunting task, but regulatory frameworks support CISOs\u2019 efforts to protect both customer and company information, while also disclosing all data use cases and requiring consent. For example, the CCPA includes a provision that requires organisations to take reasonable security measures in the case of compromised data, and to notify those who may have been affected. Similarly, HIPAA and the NIST Cybersecurity Framework both call for assessments of the potential risks to health data confidentiality and integrity.<\/p>\n This fusion of data privacy and cybersecurity calls for compliance teams to make significant changes in organisational structures, resource allocation, incident response plans, and management. It is no longer adequate to deal with data privacy and cybersecurity separately. Rather, data privacy stakeholders must collaborate with wider cyber defence teams to ensure a holistic approach to security and privacy.<\/p>\n One tool that helps cyber teams to tackle data privacy and their overall security in tandem is Cyberhaven<\/a>, whose cloud-native platform protects data in cloud environments by securing it even in transit. This mitigates the threats of data exfiltration and unauthorised sharing, such as when data is transferred from one device to another. Cyberhaven\u2019s \u201cData Detection and Response\u201d functionality leverages tracing data lineage, advanced analytics, and behavioural analysis to safeguard sensitive data from both internal and external threats, thus ensuring that user data handling is in line with data privacy and cybersecurity regulations.<\/p>\n Artificial intelligence (AI) is quickly becoming a staple of the tech stacks adopted by organisations. Its use cases continuously expand as it gains new capabilities, but AI does come with its own risks.<\/p>\n It\u2019s therefore no surprise that we\u2019re now seeing the introduction of new regulations like the EU AI Act<\/a>, which seeks to make AI systems transparent, safe, traceable, nondiscriminatory, and environmentally friendly. But that\u2019s just the tip of the iceberg \u2013 Deloitte has identified<\/a> over 1600 AI policy initiatives originating from 69 of the world\u2019s nations.<\/p>\n AI is being regulated because of the real risks it poses. For one, AI tech has been associated with privacy violations because of the improper handling of training data. There are also worries about the factual errors or inappropriateness of the advice given out by generative AI products. Additionally, threat actors have already started taking advantage of AI to aid them in their attacks, and to use it for disinformation purposes.<\/p>\n The regulation of artificial intelligence, particularly the emergence of more compliance requirements, are complicating cyber GRC for organisations. Notably, the rise of different geo-dependent regulations and frameworks is making it difficult for companies that develop or even use AI to remain compliant. There is a need for a straightforward but powerful solution to facilitate the discovery of AI use in an organisation and implement policy changes to address compliance concerns.<\/p>\n Using a technology adoption management solution like Harmonic Security<\/a> allows organisations to track their adoption of Generative AI (GenAI) solutions, manage the risks that come with GenAI use, and identify shadow AI. This helps ensure that the use of innovative tools does not result in security compromises.<\/p>\n When it comes to cybersecurity, today\u2019s businesses face a changing governance, risk, and compliance management landscape mired by various challenges, from the melding of data privacy and cybersecurity to the need for company-specific frameworks and evolving AI compliance requirements. It is important to adapt to these challenges on an agile basis to maximise operational efficiency and cyber protection.<\/p>\n A proactive and integrated GRC strategy provides security teams with the best way to maximise operational efficiency while addressing risks and keeping up with compliance requirements. The importance of specific GRC frameworks to match the specific needs of an organisation cannot be overstated in view of the rise of regulations related to AI development and use and the merging of data privacy and cybersecurity.<\/p>\n The post Emerging Issues Shaping The Future Of Cyber GRC<\/a> appeared first on Real Business<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" As organisations become increasingly reliant on digital infrastructures, they are turning to the governance, risk management and compliance (GRC) model to ensure a comprehensive and integrated approach to cybersecurity. As a subset of GRC, the term \u201ccyber GRC\u201d reflects the policies in place to manage and reduce cybersecurity-specific risks, and the adherence to relevant standards, […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8],"tags":[],"_links":{"self":[{"href":"https:\/\/paarentingnation.com\/index.php\/wp-json\/wp\/v2\/posts\/316"}],"collection":[{"href":"https:\/\/paarentingnation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/paarentingnation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/paarentingnation.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/paarentingnation.com\/index.php\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":1,"href":"https:\/\/paarentingnation.com\/index.php\/wp-json\/wp\/v2\/posts\/316\/revisions"}],"predecessor-version":[{"id":317,"href":"https:\/\/paarentingnation.com\/index.php\/wp-json\/wp\/v2\/posts\/316\/revisions\/317"}],"wp:attachment":[{"href":"https:\/\/paarentingnation.com\/index.php\/wp-json\/wp\/v2\/media?parent=316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/paarentingnation.com\/index.php\/wp-json\/wp\/v2\/categories?post=316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/paarentingnation.com\/index.php\/wp-json\/wp\/v2\/tags?post=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}The Need to Create Company-Specific Frameworks<\/h2>\n
Dissolving Boundaries Between Data Privacy and Cybersecurity<\/h2>\n
Evolution of the AI Compliance Landscape<\/h2>\n
Enabling Efficient GRC Amid Challenges<\/h2>\n