{"id":3163,"date":"2022-02-21T13:32:47","date_gmt":"2022-02-21T13:32:47","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3163"},"modified":"2022-09-14T09:16:05","modified_gmt":"2022-09-14T09:16:05","slug":"build-cybersecurity-into-your-compliance-not-the-other-way-around","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/","title":{"rendered":"Build Cybersecurity Into Your Compliance, Not the Other Way Around"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><p>Have you ever gone climbing? <a href=\"https:\/\/internationalsecurityjournal.com\/a-cloud-security-mountain\/\">If yes<\/a>, then you are aware of carabiners. Generally speaking, the carabiner is a coupling link with a safety closure designed to keep you safe when climbing rocks. Cybersecurity shares many common features with the carabiners \u2013 it is also there to keep you safe and make sure your organization does not fail spectacularly when trouble arises. Looking at cybersecurity as a hurdle your company has to overcome in order to meet all your compliance requirements is like seeing carabiners as a necessary evil for mountaineering.<\/p>\n<p>As the number and severity of cyber-attacks increase, international organizations and governments seek to enforce cybersecurity by establishing more stringent compliance requirements. However, compliance requirements often lag cybersecurity risk. Therefore, to prepare for changing compliance requirements, organizations need to create a \u2018cybersecurity-first\u2019 approach to stay ahead of the evolving requirements.<\/p>\n<p>Although cybersecurity and compliance are often used interchangeably, both are different approaches to the problem of cybersecurity threats.<\/p>\n<h2>What is cybersecurity?<\/h2>\n<p>While it seems that cybersecurity is a clear thing, it isn\u2019t. When it comes to compliance and standards, cybersecurity can be a complex undertaking. If we try to define \u201ccybersecurity\u201d, then we could simply say that it is the processes and practices that you put into place to protect your IT infrastructure, including data, networks, and any cloud assets or applications.<\/p>\n<p>But implementing security controls across all these systems means that cybersecurity is a complex system of inter-related solutions that can address not only immediate threats but potential threats that emerge as different systems interact with each other.\u00a0It is often these unforeseen attacks that can make a system vulnerable. As a result, cybersecurity covers several levels of engagement \u2013 technical, physical, and administrative.<\/p>\n<p>Cybersecurity is not only important but necessary in today\u2019s modern digital landscape. That\u2019s because security provides necessary support across almost every operation of your business, including:<\/p>\n<ul>\n<li>Protecting customer and client data against theft<\/li>\n<li>Improving business resiliency against attacks or disasters<\/li>\n<li>Building reputation with customers<\/li>\n<li>Maintaining compliance with industry regulations<\/li>\n<\/ul>\n<p>This last bullet is increasingly a catalyst for cybersecurity investment for most businesses.<\/p>\n<h2>What is compliance?<\/h2>\n<p>\u201cCompliance\u201d means adherence to security and privacy regulations enacted by a governing body or a standards organization to demonstrate a specific level of security. While cybersecurity includes all the tools, processes, and operations in place to protect data, compliance is aligning those security systems with one or more required regulations.<\/p>\n<p>However, compliance is not based on a stand-alone standard or regulation. Depending on the industry, different standards may overlap, which can create confusion and excess work for organizations using a checklist-based approach.<\/p>\n<p>For example, the healthcare industry needs to meet <a href=\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/understanding-hipaa-security-2\/\" target=\"_blank\" rel=\"noopener\">Health Insurance Portability and Accountability Act (HIPAA)<\/a> compliance requirements, but if a provider also accepts payments through a point-of-service (POS) device, then it also needs to meet <a href=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/7-strategic-outtakes-from-verizons-2020-payment-security-report\/\" target=\"_blank\" rel=\"noopener\">Payment Card Industry Data Security Standard (PCI DSS)<\/a> requirements. Companies that serve customers or do business with individuals in the European Union must comply with the EU <a href=\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/what-are-seven-principles-gdpr\/\" target=\"_blank\" rel=\"noopener\">General Data Protection Regulation (GDPR)<\/a>, and businesses meeting certain criteria that have customers in California must comply with the <a href=\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/california-consumer-privacy-act-what-to-know\/\" target=\"_blank\" rel=\"noopener\">California Consumer Privacy Act (CCPA)<\/a>.<\/p>\n<h2>It&#8217;s all about risk<\/h2>\n<p>Risk represents the threats that your IT infrastructure and data face due to existing threats and gaps in cybersecurity controls.<\/p>\n<p>Compliance is the art of managing risk &#8211; the practice of strategizing threat remediation against business goals, systems, and data. Compliance standards outline blueprints that can help organizations protect sensitive data from cyber-enabled threats. Cybersecurity measures are components of a compliance strategy.<\/p>\n<p>If we think it in another way, compliance is at the strategic level of doing business, while cybersecurity is found at the tactical level of operations. Cybersecurity controls address real security threats, and compliance is the blueprint for how those controls work together to reduce the overall business risk because of cyber-attacks.<\/p>\n<p>Compliance can also help to identify any gaps in your existing cybersecurity program which might not have otherwise been identified outside of a compliance audit. Additionally, compliance helps organizations to have a standardized security program, as opposed to one where controls may be chosen randomly.<\/p>\n<h2>How to build cybersecurity into your compliance<\/h2>\n<p>The following steps can help you build a \u2018cybersecurity-first\u2019 approach.<\/p>\n<ol>\n<li><strong>Understand your risk environment<\/strong><\/li>\n<\/ol>\n<p>While achieving compliance is important \u2014 or even required \u2014 to assure customers and clients that you have data protection protocols in place, it is not the sole indicator of being cyber-secure. Compliance attestations are demonstrating your adherence to the regulations at a certain point in time. What you need is running vulnerability scans on a frequent cadence and an ongoing basis. With time being an important factor in risk mitigation, organizations with frequent scans can remediate flaws faster.<\/p>\n<ol start=\"2\">\n<li><strong>Mitigate risk<\/strong><\/li>\n<\/ol>\n<p>Once you understand your risk with regular vulnerability assessments, the next step is to mitigate the opportunities for cyber threats by prioritizing according to risk severity and repairing the most severe areas of vulnerability.<\/p>\n<p>While tools and systems help you identify your biggest threats, they need to be weighed against the risk to your organization \u2014 the potential for loss, damage, or destruction of an asset. Ask yourself, &#8220;What is the impact of a given vulnerability to our bottom line, our operations, and our company&#8217;s reputation?&#8221; Cross-reference the size of impact with the highest threats and fix those areas first.<\/p>\n<ol start=\"3\">\n<li><strong>Transfer residual risk<\/strong><\/li>\n<\/ol>\n<p>Understanding risk and mitigating risk are imperative for making sure your company is cyber secure. But there will always be a residual risk that you want to transfer with cyber insurance. This is the part of your cybersecurity program that allows you to recover financial losses from a business interruption in the event of a cyberattack.<\/p>\n<h2>How ITEGRITI can help you<\/h2>\n<p>Being compliant is important to giving your customers confidence that you are protecting their data, but it is not the same as having a robust cybersecurity posture. Effective cybersecurity and compliance programs rely on key functional support from security and compliance managers having specific roles and experience. These professionals are in high demand and not all organizations are staffed to meet these needs, while others divide and distribute tasks across many resources. This approach most often creates environments where management has no access to timely and accurate information on the effectiveness of their cybersecurity or compliance programs.<\/p>\n<p>By establishing a key set of necessary tasks and developing a model where organizations can select services to meet their specific need and budget, <a href=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\">ITEGRITI can provide ongoing compliance and cybersecurity advisory<\/a>. <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">Contact our experts<\/a> to discover how ITEGRITI can help you.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever gone climbing? If yes, then you are aware of carabiners. Generally speaking, the carabiner is a coupling link with a safety closure designed to keep you safe when climbing rocks. Cybersecurity shares many common features with the carabiners \u2013 it is also there to keep you safe and make sure your organization does not fail spectacularly when trouble arises. <\/p>\n","protected":false},"author":10,"featured_media":3165,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[2188,2193,2192,2195],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Build Cybersecurity Into Your Compliance, Not the Other Way Around<\/title>\n<meta name=\"description\" content=\"Cybersecurity shares many common features with carabiners. It&#039;s there to keep you safe and ensure your organization won&#039;t fail in a crisis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Build Cybersecurity Into Your Compliance, Not the Other Way Around\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity shares many common features with carabiners. It&#039;s there to keep you safe and ensure your organization won&#039;t fail in a crisis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-21T13:32:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-14T09:16:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog83_cybersecurity_into_compliance.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Build Cybersecurity Into Your Compliance, Not the Other Way Around\",\"datePublished\":\"2022-02-21T13:32:47+00:00\",\"dateModified\":\"2022-09-14T09:16:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/\"},\"wordCount\":1357,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog83_cybersecurity_into_compliance.jpg\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\",\"Finance Sector\",\"Water Sector\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/\",\"name\":\"Build Cybersecurity Into Your Compliance, Not the Other Way Around\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog83_cybersecurity_into_compliance.jpg\",\"datePublished\":\"2022-02-21T13:32:47+00:00\",\"dateModified\":\"2022-09-14T09:16:05+00:00\",\"description\":\"Cybersecurity shares many common features with carabiners. It's there to keep you safe and ensure your organization won't fail in a crisis.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog83_cybersecurity_into_compliance.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog83_cybersecurity_into_compliance.jpg\",\"width\":800,\"height\":450,\"caption\":\"cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Build Cybersecurity Into Your Compliance, Not the Other Way Around\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Build Cybersecurity Into Your Compliance, Not the Other Way Around","description":"Cybersecurity shares many common features with carabiners. It's there to keep you safe and ensure your organization won't fail in a crisis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/","og_locale":"en_US","og_type":"article","og_title":"Build Cybersecurity Into Your Compliance, Not the Other Way Around","og_description":"Cybersecurity shares many common features with carabiners. It's there to keep you safe and ensure your organization won't fail in a crisis.","og_url":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2022-02-21T13:32:47+00:00","article_modified_time":"2022-09-14T09:16:05+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog83_cybersecurity_into_compliance.jpg","type":"image\/jpeg"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Build Cybersecurity Into Your Compliance, Not the Other Way Around","datePublished":"2022-02-21T13:32:47+00:00","dateModified":"2022-09-14T09:16:05+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/"},"wordCount":1357,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog83_cybersecurity_into_compliance.jpg","keywords":["Cybersecurity","Energy Sector","Finance Sector","Water Sector"],"articleSection":["Compliance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/","url":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/","name":"Build Cybersecurity Into Your Compliance, Not the Other Way Around","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog83_cybersecurity_into_compliance.jpg","datePublished":"2022-02-21T13:32:47+00:00","dateModified":"2022-09-14T09:16:05+00:00","description":"Cybersecurity shares many common features with carabiners. It's there to keep you safe and ensure your organization won't fail in a crisis.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog83_cybersecurity_into_compliance.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog83_cybersecurity_into_compliance.jpg","width":800,"height":450,"caption":"cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/build-cybersecurity-into-your-compliance-not-the-other-way-around\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Build Cybersecurity Into Your Compliance, Not the Other Way Around"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3163"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3163"}],"version-history":[{"count":4,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3163\/revisions"}],"predecessor-version":[{"id":3566,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3163\/revisions\/3566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3165"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}