Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

Compliance Costs Increasing, Study Says

Despite progress in compliance projects, most companies spent more in the past year than they did the year before

Now that most organizations are fairly deep into their compliance efforts, you'd think that the heavy lifting was over and the cost of compliance would be dropping off. Unfortunately, according to a new study, you'd be wrong.

According to an independent study on compliance costs released today by CA, almost half of the companies surveyed reported an increase in their compliance project spending, rather than a decrease.

In a study of some 575 enterprises worldwide, nearly 45 percent of respondents reported an increase in the time and monetary resources required to ensure compliance with 13 regulations and industry standards found in countries around the world.

In North America, 41 percent of organizations reported the introduction of new regulations as a reason for increasing compliance expenses. In Asia Pacific, where J-SOX was recently enacted, this number was significantly higher at 55 percent, the report states. Europe and Central/South America reported 40 percent and 29 percent, respectively.

Changes to existing regulations also were reported as a cost-raising factor by 49 percent of North American and Central/South American organizations, by 39 percent of Asia Pacific businesses, and by 34 percent of European organizations, CA says.

The study also showed that most of the respondents rely on manual processes to achieve compliance, although manual processes and a lack of centralized control are "a recipe for spiraling costs," the report says. More than two thirds of the respondents said they maintain information about the status of their IT compliance controls in multiple spreadsheets, and often within different organizational units.

“This survey verifies what we regularly hear from customers -- that compliance remains a big challenge for them in both direct cost and impact to business processes, and that the issue grows with every regulatory change or addition,” said Lina Liberti, vice president for CA Security Management.

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19807
PUBLISHED: 2019-12-15
In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for ...
CVE-2014-8650
PUBLISHED: 2019-12-15
python-requests-Kerberos through 0.5 does not handle mutual authentication
CVE-2014-3536
PUBLISHED: 2019-12-15
CFME (CloudForms Management Engine) 5: RHN account information is logged to top_output.log during registration
CVE-2014-3643
PUBLISHED: 2019-12-15
jersey: XXE via parameter entities not disabled by the jersey SAX parser
CVE-2014-3652
PUBLISHED: 2019-12-15
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.