Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Improve Cybersecurity Compliance With Real-Time Data and Automation
Cybersecurity

How to Improve Cybersecurity Compliance With Real-Time Data and Automation

Bill DoerrfeldBy Bill DoerrfeldMarch 10, 2023Updated:March 10, 20235 Mins Read
Facebook Twitter LinkedIn Email
compliance cybersecurity
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Digital enterprises are grappling with an increasing number of compliance requirements and data regulations. There are geographic data privacy standards, varying by country and state, as well as industry-specific compliance regulations to adhere to. As governing bodies continue to issue new cybersecurity compliance frameworks, there is an escalating degree of complexity to manage.

In theory, reaching compliance should equate to improved security, but compliance audits often rely on outdated information and leave gaps exposed — it can be challenging to understand or validate their accuracy. And when a breach occurs, the responsibility often lands on the shoulders of CISOs, who may face termination or forced resignation depending on the exploit’s severity. (This may explain why CISOs are in such short supply these days.)

I recently met with Igor Volovich, VP of Compliance Strategy for cybersecurity compliance firm Qmulos, to learn more about the issues plaguing modern compliance procedures. According to Volovich, most organizations view compliance as just another hurdle, not something that actually helps improve security. Compliance checks are also manual, cumbersome and, surprisingly, rely on a lot of word-of-mouth accounts.

To Volovich, compliance needs data-driven, real-time analysis that is more automated and factual. Below, we’ll analyze the state of many compliance efforts and consider ways to make them run better.

Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

Understanding the State of Compliance

These days, organizations must comply with many types of standards and regulations. Critical infrastructure is constantly a target for bad actors, which has influenced governing bodies, such as the National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA), to introduce hardened cybersecurity frameworks.

Businesses also have industry-specific guidelines to follow, such as the Payment Card Industry Data Security Standard (PCI DSS), which describes common threat patterns to avoid hacks and financial data leaks. Other compliance requirements are more internal — for example, the Federal Trade Commission (FTC) takes an active role in issuing consent decrees to companies that use deceptive tactics or violate their privacy promises to consumers.

Organizations must audit their technology processes to ensure their data-handling practices are up to snuff. Yet historically, meeting compliance requirements has been viewed negatively, says Volovich. It’s often seen as a nuisance with colossal overhead — plus, companies often just adopt the philosophy of implementing more and more “best of breed” cybersecurity tools to solve their needs, causing their expenses to balloon. As such, “how much do I need to spend to be secure?” is an all-too-common question.

Furthermore, Volovich notices many hurdles when conducting compliance reviews. Gathering this information often relies on many manual reviews and interviews — he describes this process as “opinion farming at scale.” Making matters worse, gathering real insights can involve a lot of teeth-pulling — leaders may encounter reluctance as engineers don’t want to expose workflow inefficiencies, he says. Too often, businesses end up relying on old, outdated, and offhand data to inform their compliance posture.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner analysts.

How to Fix Broken Compliance Processes

Failure to meet compliance requirements can result in hefty fines and harm a brand’s reputation. So, knowing these gaps in the average compliance processes, how can organizations fix them? Volovich shared some insights to help organizations ensure compliance regulations are met.

Don’t Rely on the Best-of-Breed Perspective

First off, higher spending on niche tools doesn’t always equate to a greater security posture. Instead, teams should consider where they are directing resources to address controls across their systems.

Use Real-Time Data

Compliance checks relying on outdated data are obsolete, especially given the rapid pace of change for software dependencies and new vulnerabilities. Thus, it’s important to evaluate a compliance footing based on real-time data produced by application systems, whenever possible. 

Avoid Opinion-Based Judgments

Data-driven evidence is infallible. People, on the other hand, are biased and may even have motives to withhold information. Therefore, Volovich recommends trusting data, not people.

Introduce Compliance Automation

Any compliance requirements you can infer with data should be automated, says Volovich. Things like authorization issues, token reissuances, or recycling passwords are verifiable and can be checked with data produced by software systems. For example, Qmulos can analyze data collected by Splunk data search software and infer violations from a laundry list of compliance requirements. 

Avoid the Swivel Chair

Of course, not all cybersecurity framework controls can be automated away. Some will still require manual assessment. However, manual and automated assessments shouldn’t be separated into different platforms. Volovich recommends centralizing on a shared platform to avoid friction and constant context switching.

Collect and Store Data Relevant to You

Lastly, it’s good to track as many data points as possible. Yet at the same time, generating unnecessary data lakes can incur a high cost. Thus, organizations should look at their environment and map data collection relevant to the compliance frameworks they need to address.

Final Thoughts

There are many legal liabilities associated with mishandling compliance requirements, and nobody’s immune, says Volovich. Leaders can’t hide behind the complexity, and they shouldn’t trust compliance auditing built on a retroactive timescale — this could place businesses leagues behind where attackers are operating on the cutting edge. Therefore, he recommends employing evidence-based, real-time data and automating technical controls whenever possible.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

CISO Compliance data featured framework
Share. Facebook Twitter LinkedIn Email
Bill Doerrfeld
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

Related Posts

Microsoft Adopts A2A Protocol, Agentic AI Era Begins

May 9, 2025

AI Agent & Copilot Podcast: Finastra Chief AI Officer Lays Out Range of Use Cases, Microsoft Collaboration

May 9, 2025

IBM Launches Microsoft Practice to Accelerate AI, Cloud, and Security Transformation

May 9, 2025

AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls

May 8, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft Adopts A2A Protocol, Agentic AI Era Begins
  • AI Agent & Copilot Podcast: Finastra Chief AI Officer Lays Out Range of Use Cases, Microsoft Collaboration
  • IBM Launches Microsoft Practice to Accelerate AI, Cloud, and Security Transformation
  • AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls
  • ServiceNow Re-Invents CRM for End-to-End Enterprise

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.