top of page

🎖️⚖️ Cyber Security and Compliance: Two sides of the same coin? 🎖️⚖️

  • Writer: Daniel Eberhorn
    Daniel Eberhorn
  • Aug 19
  • 4 min read
A sleek digital illustration featuring a coin at the center, split into two sides. The left side is labeled 'Cyber Security,' with symbols of digital locks and shields, while the right side is labeled 'Compliance,' showingcasing scales and checkmarks. The background is a gradient of blue and gray, reflecting a high-tech and professional design. The image emphasizes the interconnected nature of cyber security and compliance.

Image generated by OpenAI's DALL·E


Cyber security and compliance – two terms that are often mentioned in the same breath. Some companies believe that adhering to compliance requirements is enough to protect their systems and data from cyber attacks. But the reality is different: time and again, companies meet all regulatory requirements but still fall victim to ransomware attacks or data leaks.


An incident in 2020 at the European Medicines Agency (EMA) shows that simply adhering to compliance requirements such as GDPR or ISO 27001 is not enough to protect companies from cyberattacks. Despite high security standards and the implementation of comprehensive compliance measures, attackers managed to illegally access documents related to the COVID-19 vaccine from Pfizer and BioNTech.


Pfizer's press release underscores the importance of going beyond meeting compliance requirements and implementing proactive security measures to protect against the ever-evolving threats in cyberspace.



Why Cyber Security and Compliance are often equated

Cyber security and compliance are often considered synonymous, although they have different approaches and goals. This is because both concepts aim to protect data and systems, which gives the impression that they are the same. But while cyber security aims to proactively ward off threats and flexibly adapt security measures to new challenges, compliance focuses on adhering to legal and regulatory requirements.


A common obstacle to effectively implementing both approaches is the so-called "checkbox mentality". Many companies view compliance as a list of requirements to be met without questioning the actual security benefits of the measures. According to a study by the Ponemon Institute, 60% of companies have experienced two or more business-disruptive cyber incidents in the last 24 months. However, real-world reports show that even with full compliance, serious security incidents can still occur.


Practical examples illustrate this point:



Differences between Cyber Security and Compliance

The most important difference between cyber security and compliance lies in their objectives. Compliance ensures that companies meet legal and regulatory requirements. Cyber security, on the other hand, aims to ward off threats in real time and minimize damage.


While compliance is often static and tied to fixed frameworks such as GDPR, ISO 27001 or the IT Security Act, cyber security requires a dynamic approach. Cyber attacks are constantly evolving and security measures must respond flexibly. For example, the introduction of multi-factor authentication (MFA) was an exception just a few years ago, but today it is defined as a MUST criterion in several frameworks.


Another difference is in responsibility: Compliance is often managed by legal departments or external auditors, while cyber security is in the hands of IT and security teams. This often leads to tensions when compliance requirements restrict security measures - for example through strict data retention requirements.



similarities and overlaps

Despite their differences, there are also overlaps. Both concepts aim to minimize risks and secure the trust of customers, partners and regulators. Measures such as encryption, access controls or regular training help both to meet compliance requirements and to improve the security situation.


One example of this is the GDPR. Article 32 requires "appropriate technical and organizational measures" to protect personal data. Companies that implement these requirements through modern security solutions such as Endpoint Detection and Response (EDR) or zero-trust models simultaneously improve their cyber security.

But there are limits here too. Compliance requirements often only set minimum standards. A company can meet all requirements and still be vulnerable if it does not introduce additional measures.



contradictions and areas of tension

In practice, areas of tension between compliance and cyber security arise again and again. A common problem is the conflict of priorities. Companies are often faced with the question: Should the budget be invested in meeting compliance requirements that are checked during audits, or in security measures that ward off actual threats?


Another area of tension concerns data protection requirements. While cyber security often requires extensive logging and monitoring measures to detect attacks, data protection laws such as the GDPR limit these options. For example, a company wants to analyze suspicious activities in real time, but is not allowed to store personal data without obtaining the consent of those affected.



Solutions: How both approaches could be combined

To meet both compliance and security requirements, companies need a holistic strategy. Compliance should be viewed as the basis on which a proactive cyber security strategy is built.


risk-based approach

A proven model is the risk-based approach. Companies first assess the specific risks for their industry and their IT infrastructure and use this to derive security measures that go beyond pure compliance requirements. For example, a company that is often the target of ransomware attacks can invest more in backup solutions and contingency plans.


training and communication

Integrating compliance and cyber security also requires close collaboration between different departments. Regular training and open communication between IT teams, legal departments and management can reduce tensions and promote a common security culture.


Technological support

Modern technologies such as Security Information and Event Management (SIEM) or AI-based security solutions help to combine security and compliance goals. For example, a SIEM system can ensure that compliance requirements such as logging are met while enabling real-time threat detection.



Conclusion

Compliance and cyber security are two sides of the same coin that complement each other but cannot replace each other. Compliance provides the basis and ensures legal certainty, while cyber security enables dynamic defense against current and future threats.


Companies that strategically combine both approaches are better equipped to not only meet legal requirements but also effectively manage real security risks.


The message is clear:

Compliance is important, but without a strong security strategy it remains a paper tiger.

Logo of SecurityWho - A fingerprint and the slogon IT-Security made simple

Contact me

© Daniel Eberhorn - SecurityWho

bottom of page