Business Insights
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • August 2023
  • January 2023
  • December 2021
  • July 2021
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019

Categories

  • Business
  • Crypto
  • Economy
  • Finance Expert
  • Forex
  • Invest News
  • Investing
  • Tech
  • Trading
  • Uncategorized
  • Videos
Apply Loan
Money Visa
Advertise Us
Money Visa
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact
Why AV is an overlooked cybersecurity risk
  • Tech

Compliance is evolving — Is your resilience ready?

  • July 18, 2025
  • Roubens Andy King
Total
0
Shares
0
0
0
Total
0
Shares
Share 0
Tweet 0
Pin it 0

Life is changing fast for privacy professionals.

A decade ago, our focus was making sure our organizations were being transparent and thoughtful about collecting individuals’ personal data and giving them choice about the handling of their data, meticulously safeguarding it, and advising on obligations and best practices in the event personal data was compromised.

Today, I still do all these things, but as the cyber security regulatory environment has changed, my scope has grown to include not only keeping personal data private, but also how to handle threats to the integrity and availability of the services processing that personal data.


You may like

This means I spend a lot of time with Cloudflare product and engineering teams on matters related to the availability and resilience of our products. We work on developing ways to measure the effects of outages, determining which incidents must be reported and, when necessary, actually shaping the report and response.

I’m not alone in perceiving a shift in the privacy and compliance world. More than 80% of privacy professionals are tasked with working beyond their more traditional privacy duties, according to the International Association of Privacy Professionals’ 2024 Privacy Governance Report.

Cyber security regulatory compliance has become the second-most-common new responsibility among respondents whose remits are growing. In addition to protecting privacy, we now need to ensure our organizations are reducing cyber risks and enhancing resilience.

Emily Hancock

Social Links Navigation

Navigating new regulations

The change in the role of privacy professionals reflects a major shift in the data regulation environment. Over the last two years, a series of new regulations has made resilience and risk management as essential to compliance as data privacy always has been.

Starting with the European Union’s General Data Protection Regulation (GDPR), the first wave of major data privacy and security regulations focused on protecting individuals from the harm of having their data compromised.

Compliance with GDPR, the California Consumer Privacy Act, and other similar regulations meant respecting the rights of data subjects, limiting the amount of personal data organizations collected, and protecting that information from unauthorized disclosure and bad actors.

Three new regulations

Three new regulations that have taken effect since 2023 are representative of how compliance is changing: the Network and Information Security 2 (NIS2) directive, the Digital Operational Resilience Act (DORA), and the U.S. Securities and Exchange Commission (SEC) Cybersecurity Rule.

In Europe, NIS2 aims to improve digital resilience and security practices across 18 sectors, while DORA focuses on risk in IT management in the financial sector. The SEC’s new rule raises security and reporting standards for publicly traded American companies.

Because it covers so many industries across all of Europe, NIS2 may have the broadest impact of the three. NIS2 challenges organizations to assess risk more thoroughly, handle incidents more quickly, and do more to ensure business continuity. NIS2 requires organizations to address:

  • The visibility of all IT assets across environments, enabling comprehensive risk assessment and proactive incident handling.
  • The security of the software supply chains that support critical systems.
  • Security across the entire lifecycle of network and information systems.
  • The vulnerability of mission-critical web applications to third-party threats.
  • Encryption, access control, and authentication for a range of user types, devices, and systems.

Security, privacy, and resiliency requirements

NIS2 also imposes those security, privacy, and resiliency requirements on a wider collection of industries and organizations than its predecessor, the original Network and Information Security Directive (“NIS”). NIS applied to several sectors that function as crucial national infrastructure, including energy, transportation, banking and finance, water, and healthcare.

NIS2 adds wastewater management, the space industry, public administration, and managed business-to-business IT services to that group. It also adds six new industries to the “important” category: waste management, food processing, research, post and courier services, chemical production and distribution, and certain types of manufacturing.

Firms in both categories face the same basic requirements, but NIS2 mandates that organizations in essential sectors proactively demonstrate compliance. Crucially, NIS2 requirements flow through covered organizations to the third-party data processors they employ, also.

Under NIS2, medium-sized organizations (those with more than 50 employees or €10 million in annual turnover) in essential or important sectors in the EU are now subject to exacting security standards. Failure to comply has potentially ruinous consequences: fines of up to 2% of global revenue for “essential” sector firms and 1.4% for “important” ones. Persistent non-compliance can lead to suspension of services or responsible employees.

The net effect: more companies in more industries are subject to rigorous security and resiliency standards. And privacy teams play a key role in helping meet those requirements.

Building on existing privacy investments

Many of the organizations covered by NIS2 are addressing stringent cyber security regulations for the first time. They’re doing so while also managing the complexity that confronts all of us in modern IT as they operate across on-premises systems, cloud computing deployments, and edge devices.

NIS2 identifies 10 risk management measures that covered entities must take. They include assessing and planning for a wide range of hazards, from supply-chain vulnerabilities and natural disasters to network outages and human error. That complicated mix of risks crisscrosses the physical and digital worlds.

But there’s good news for covered organizations and the privacy teams stretching themselves to ensure compliance: Many of the efforts they’ve already taken to build mature, comprehensive privacy programs can be leveraged to aid in compliance with cyber security regulations.

For instance, NIS2’s risk assessment mandates require covered firms to inventory all assets in their IT estates. DORA does the same for companies in finance. Existing data maps developed for privacy purposes give organizations a head start on understanding their asset collections and the risks facing them.

Privacy teams play an essential role in meeting the incident handling demands of NIS2 and other new regulations. For example, we help determine when incidents meet the reporting threshold and work with observability teams to ensure our organizations have the data we must share with regulators and the public.

Achieving compliance without adding complexity

However, sturdy your foundation, meeting NIS2’s mandates presents new technological challenges. For many organizations, business continuity depends on continuous availability of web applications. That means protection against distributed denial-of-service (DDoS) attacks at the network, transport, and application layers.

Covered firms also have a new level of accountability for the security of the third-party apps they use and the software supply chain underlying their stacks. The stiff penalties for non-compliance make the fundamentals of cyber security more important than ever: pre-empting phishing and malware attacks, access control and management, and the appropriate use of cryptography, encryption, and multi-factor authentication (MFA).

There’s no single system or piece of software that can take on those challenges. It’s a matter of strategy — a mix of technology, policy, procedure, and ingenuity. But the tools do matter. And choosing security solutions suited to the evolving regulatory environment can reduce complexity and cost as organizations pursue compliance.

Three key questions to ask

Here are three key questions to ask as you assess cyber security solutions in light of NIS2:

1. Are these solutions versatile enough for complex IT environments? There are point solutions that may be well suited to individual aspects of NIS2 compliance, but weaving several of them into hybrid environments can complicate management and leave security gaps.

2. Do they make visibility simpler? Inventorying IT assets, identifying potential security issues, and quickly investigating threats are essential to NIS2 compliance. The right security platform will deliver visibility and reporting on demand.

3. Are they built for business continuity? Interruptions to web applications threaten essential services. Look for solutions that reduce web downtime with multiple layers of protection against attacks.

We've featured the best privacy tool and anonymous browser.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Roubens Andy King

Previous Article
Secured #6 – Writing Robust C – Best Practices for Finding and Preventing Vulnerabilities
  • Forex

Secured #6 – Writing Robust C – Best Practices for Finding and Preventing Vulnerabilities

  • July 18, 2025
  • Roubens Andy King
Read More
Next Article
Satoshi-Era Bitcoin Whale Shifts Last Of Stack To Galaxy Digital
  • Crypto

Satoshi-Era Bitcoin Whale Shifts Last Of Stack To Galaxy Digital

  • July 18, 2025
  • Roubens Andy King
Read More
You May Also Like
Disney Settles FTC Complaint With YouTube Over Children’s Data Collection
Read More
  • Tech

Disney Settles FTC Complaint With YouTube Over Children’s Data Collection

  • Roubens Andy King
  • September 3, 2025
This HP laptop with an astonishing 32GB of RAM is just 1
Read More
  • Tech

This HP laptop with an astonishing 32GB of RAM is just $261

  • Roubens Andy King
  • September 3, 2025
Hot deal: Samsung Galaxy S25 Edge plummets to record-low price!
Read More
  • Tech

Hot deal: Samsung Galaxy S25 Edge plummets to record-low price!

  • Roubens Andy King
  • September 3, 2025
007 First Light looks like a hit, man
Read More
  • Tech

007 First Light looks like a hit, man

  • Roubens Andy King
  • September 3, 2025
Amazon’s Tomb Raider series will star Sophie Turner as Lara Croft
Read More
  • Tech

Amazon’s Tomb Raider series will star Sophie Turner as Lara Croft

  • Roubens Andy King
  • September 3, 2025
Orchard Robotics, founded by a Thiel fellow Cornell dropout, raises M for farm vision AI 
Read More
  • Tech

Orchard Robotics, founded by a Thiel fellow Cornell dropout, raises $22M for farm vision AI 

  • Roubens Andy King
  • September 3, 2025
Meta launches an Instagram app for the iPad, 15 years after its mobile app; it is slightly different than the mobile app, opening directly to a feed of Reels (Mia Sato/The Verge)
Read More
  • Tech

Meta launches an Instagram app for the iPad, 15 years after its mobile app; it is slightly different than the mobile app, opening directly to a feed of Reels (Mia Sato/The Verge)

  • Roubens Andy King
  • September 3, 2025
Acer Swift Air 16 laptop weighs less than 1kg, with a 16-inch screen, up to 32GB memory, and up to 1TB storage
Read More
  • Tech

Acer Swift Air 16 laptop weighs less than 1kg, with a 16-inch screen, up to 32GB memory, and up to 1TB storage

  • Roubens Andy King
  • September 3, 2025

Recent Posts

  • The New Rules of Building Wealth | Bullish
  • If I Were To Invest 5 Lacs in Quality Stocks For LONG TERM (2030) (Ft Saurabh Mukherjea/Rahul Jain)
  • ‘Out of Funds.’ The Van Der Beek GoFundMe Hit $2.5M. Commenters Point to the $4.76M Ranch Bought About a Month Before His Death
  • How the Quran Talks About Money, Trade and Business | Quran & The Global Economy by Nouman Ali Khan
  • From Waiter in Bangalore To ₹1Cr+ Portfolio | Financial Freedom Journey
Featured Posts
  • The New Rules of Building Wealth | Bullish 1
    The New Rules of Building Wealth | Bullish
    • February 15, 2026
  • If I Were To Invest 5 Lacs in Quality Stocks For LONG TERM (2030) (Ft Saurabh Mukherjea/Rahul Jain) 2
    If I Were To Invest 5 Lacs in Quality Stocks For LONG TERM (2030) (Ft Saurabh Mukherjea/Rahul Jain)
    • February 14, 2026
  • ‘Out of Funds.’ The Van Der Beek GoFundMe Hit .5M. Commenters Point to the .76M Ranch Bought About a Month Before His Death 3
    ‘Out of Funds.’ The Van Der Beek GoFundMe Hit $2.5M. Commenters Point to the $4.76M Ranch Bought About a Month Before His Death
    • February 14, 2026
  • How the Quran Talks About Money, Trade and Business | Quran & The Global Economy by Nouman Ali Khan 4
    How the Quran Talks About Money, Trade and Business | Quran & The Global Economy by Nouman Ali Khan
    • February 13, 2026
  • From Waiter in Bangalore To ₹1Cr+ Portfolio | Financial Freedom Journey 5
    From Waiter in Bangalore To ₹1Cr+ Portfolio | Financial Freedom Journey
    • February 12, 2026
Recent Posts
  • Federal Reserve Board – Federal Reserve Board announces approval of application by Cooperativa de Ahorro y Credito Elga, Ltda.
    Federal Reserve Board – Federal Reserve Board announces approval of application by Cooperativa de Ahorro y Credito Elga, Ltda.
    • February 12, 2026
  • Federal Reserve Board – Federal Reserve Board issues enforcement action with former employee of Regions Bank
    Federal Reserve Board – Federal Reserve Board issues enforcement action with former employee of Regions Bank
    • February 12, 2026
  • How to Invest like the Rich 0.01%?
    How to Invest like the Rich 0.01%?
    • February 11, 2026
Categories
  • Business (2,057)
  • Crypto (2,023)
  • Economy (214)
  • Finance Expert (1,687)
  • Forex (2,016)
  • Invest News (2,434)
  • Investing (2,040)
  • Tech (2,056)
  • Trading (2,024)
  • Uncategorized (2)
  • Videos (973)

Subscribe

Subscribe now to our newsletter

Money Visa
  • Privacy Policy
  • DMCA
  • Terms of Use
Money & Invest Advices

Input your search keywords and press Enter.