April 18, 2017 By Rick M Robinson 2 min read

The scope and sophistication of cybercrime continues to grow, with the Dark Web marketplace evolving to provide an ecosystem and even a language designed for the needs of organized crime and other bad actors.

In the face of this challenge, enterprises are still too reactive in their cybersecurity practices. This remains the case even though almost everyone understands that policies shaping governance, risk and compliance (GRC) can and should provide a solid framework for a more proactive approach to security.

Navigating Through Risks and Regulations

According to Infosec Island, enterprises must have a strong “appetite for risk,” because it is the inevitable flip side of opportunity. However, organizational leaders face real frustrations in finding an effective approach to GRC.

Governmental regulations, which set the overall legal and administrative framework, tend to operate within siloed industry verticals, rather than extending in a consistent way across industries. This complicates the challenge for any enterprise that is not itself confined to one vertical.

Organizational leaders also create their own complications by pushing audit demands and other requirements onto IT teams with no regard to workload. They are placing increased responsibility on people who already have very full plates.

The Art of GRC Tool Selection

Fortunately for these overworked teams, there is light at the end of the tunnel. The security community and marketplace are providing a growing range of GRC tools that organizations can use to help keep up with their governance, risk and compliance requirements. The challenge for security professionals is to evaluate the available products and present action-ready options to the C-suite. No one else can perform this crucial role, since most organizational leaders lack the specialized training needed to judge these tools.

The first item on the checklist of GRC tool requirements is affordability, which is not a technical dimension in itself, but is essential for any solution that can be adopted. Many organizations cannot afford a full-blown enterprise suite, but most can benefit from some select tools.

Other features to look for include mitigation, remediation and delegation resources to track progress and responsibilities, risk management tools to evaluate the threat of third-party breaches, and policy libraries, mapping and views that assist those working with the tools.

Selecting effective GRC tools and achieving buy-in from the C-suite is not a simple task. But ultimately, the effort will pay dividends and build mutual confidence between organization leaders and security experts. This confidence is crucial to building effective security in a dynamic, quickly evolving security environment.

Listen to the podcast series: Take Back Control of Your Cybersecurity now

More from Risk Management

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

How TikTok is reframing cybersecurity efforts

4 min read - You might think of TikTok as the place to go to find out new recipes and laugh at silly videos. And as a cybersecurity professional, TikTok’s potential data security issues are also likely to come to mind. However, in recent years, TikTok has worked to promote cybersecurity through its channels and programs. To highlight its efforts, TikTok celebrated Cybersecurity Month by promoting its cybersecurity focus and sharing cybersecurity TikTok creators.Global Bug Bounty program with HackerOneDuring Cybersecurity Month, the social media…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today