Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Automation gains traction as CISOs grapple with compliance challenges

By Dale Hoak
Man covered in notes

Luis Villasmil via Unsplash

February 25, 2025

According to the State of Continuous Controls Monitoring (CCM) Report, over half of CISOs (51.6%) still struggle to meet their governance, risk, and compliance (GRC) goals. As security leaders navigate increasingly complex technology environments, compliance with new and existing regulations remains a significant challenge.

The report reveals a critical insight: while most CISOs see automation as a key opportunity to reduce manual processes, few are leveraging AI-powered tools in their compliance programs. This gap highlights the urgent need for modernization in compliance strategies. But are CISOs ready to transform their compliance programs?

Automation is essential

While GRC is undeniably challenging, automation promises hope for overburdened CISOs. Indeed, nearly 80% of CISOs recognize automation as an important opportunity to reduce manual processes in their compliance and risk management programs. What they expect from that automation varies, however. Just over half (51.1%) expect automation to enable them to optimize compliance through a single pane of glass — but only 14.2% would prioritize this approach! Similarly, nearly half (46.3%) believe automation would allow them to rapidly apply governance, but only 12.1% of CISOs would prioritize it.

Is compliance ready for GenAI?

And even though automation and generative artificial intelligence (GenAI) remain hot topics, most CISOs aren’t ready to adopt both technologies. In fact, 82.1% of organizations aren’t currently using GenAI tools or functions in their compliance programs. Interestingly, nearly one-third (33.2%) of organizations have incorporated automation in their compliance programs, but without GenAI tools. 

Perhaps this isn’t surprising, as GenAI tools like ChatGPT were only publicly released about two years ago. Building GenAI capabilities into compliance tools may have happened quickly, but building trust and changing the culture of compliance teams takes more time. The report showed progress, however: 17.9% already use GenAI in their compliance programs and 72.1% have developed policy and process language to ensure GenAI technology is used responsibly when (or if) it’s deployed. 

Compliance as Code starting to gain ground

Compliance as Code, which automatically demonstrates that new code complies with defined policies and regulations, is also getting traction. According to the survey, 13% of CISOs have adopted or are planning to adopt technologies that enable Compliance as Code, such as the Open Security Controls Assessment Language (OSCAL) and the Open Cybersecurity Schema Framework (OCSF). Gartner® estimates, “By 2026, 70% of enterprises will have integrated compliance as code into their DevOps toolchains, reducing risk management and improving lead time by at least 15%.” 

Despite barriers to Compliance as Code adoption, nearly all respondents (94.2%) do believe continuous controls monitoring (CCM) will improve both compliance and security. They simply haven’t decided which technology to adopt yet.

Budget and cost considerations

Adopting new technologies also always comes with budget implications. While half of CISOs spend over $200,000 annually on compliance-related resources, 69.7% consider cost an important factor when selecting tools and vendors for governance and CCM. For nearly a third, financial matters are the primary reason for resistance to change, even if that change might ultimately result in cost savings. Perhaps this is because most organizations (66.3%) don’t measure the operational cost of managing compliance (larger organizations are even less likely to measure this expense!). But it’s impossible to assess ROI or make informed budget allocation decisions without this measurement.

Prioritizing compliance and risk… or falling behind?

Unsurprisingly, considering the penalties for noncompliance, the survey showed that financial services companies are most concerned about meeting regulatory requirements (62.5% consider them a top priority). However, compliance isn’t currently a priority for 66.7% of companies in entertainment and media or for 42.9% of manufacturers. Instead, 90% of manufacturers, 82.1% of healthcare providers, 75% of entertainment and media companies, and 73.8% of software and IT companies cite cost as a priority. At the same time, nearly half of the organizations with less mature programs attributed their difficulties to a lack of personnel or resources and nearly half (46.2%) cited insufficient budget as the primary reason for not using GRC tools.

A path to simpler managing risk & compliance

The survey shows a clear mandate for increased automation to make risk and compliance easier and more effective. It’s time for organizations to explore GenAI and Compliance as Code because these technologies offer the greatest potential for streamlining compliance processes. The old adage, “what gets measured gets managed,” has never been more apt. Organizations must measure the operational costs of compliance to make more informed decisions about their technology investments. Today’s mercurial regulatory environment highlights the need for CISOs to overcome cultural barriers and embrace new technologies that enable more resilient and efficient compliance programs.

KEYWORDS: automation Chief Information Security Officer (CISO) CISO compliance compliance problems

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dale hoak headshot

Dale Hoak is the Director of Information Security at RegScale. Image courtesy of Hoak

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Two people writing on whiteboard

    It's time to embrace OSCAL automation for effective risk management

    See More
  • CISO at window with computer

    Navigating CISOs' top 4 challenges

    See More
  • Understanding the Distinct and Dependent Roles of Data, Privacy and Cybersecurity Professionals

    CISOs struggling to prepare for upcoming security compliance audits

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing