Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

A Seismic Shift: What California’s New Privacy Law Means for Cybersecurity

By John Adams
cyber-person
July 5, 2018

Humans like patterns. In fact, the careers of everyone reading this article can likely be linked to a simple pattern: an attacker finds a flaw; they exploit that flaw; cybersecurity professionals fix the flaw; outside parties react to the attack; new regulations or laws are written; we wait for the next attack. React. Rinse. Repeat.

Until now.

The enactment of the California Consumer Privacy Act of 2018 on June 28 is the latest in a series of new laws and regulations around the world that represent a fundamental shift from the reactionary approach to security governance we’ve followed since the 1980s. Starting with the European Union’s General Data Protection Regulation (GDPR) and continuing with New York’s Department of Financial Services cybersecurity regulations, privacy and security are now inextricably linked in the U.S.

Like the GDPR before it, the CCPA is getting a lot of attention because of the rights California residents will have to access data held by companies, to have that data removed, and to prohibit the sale of personal data. The new law, which does not go into effect until 2020, also creates the potential for some eye-popping payments directly to consumers impacted by a breach.

The CCPA allows consumers to sue companies for “unauthorized access and exfiltration, theft, or disclosure as a result of the business’ violation of the duty to implement and maintain reasonable security procedures and practices appropriate to the nature of the information to protect the personal information.” Under the current California law, only “customers” can sue a company, and only then if they can prove they were actually harmed as a result of a breach – a virtually impossible standard to meet.

Now, Californians whose data has been breached can seek between $100 up to $750 without having to prove they have been harmed by the data breach. Back-of-the-envelope math tells you a relatively modest breach of 1 million California residents could result in a company directly paying consumers no less than $100 million and up to $750 million. That makes the GDPR’s maximum fine of €20 million or 4% of global revenue – whichever is higher – pale in comparison.

While it may not be obvious yet, the CCPA, GDPR and the NY DFS regulations are driving a change in how businesses approach cybersecurity thanks to similar language found in all three policies: the duty to implement and maintain reasonable security procedures and practices. EU regulators have already signaled they believe a failure to maintain a robust patching program is a violation of the GDPR.

"Under the General Data Protection Regulation taking effect from May 25 this year, there may be some circumstances where organizations could be held liable for a breach of security that relates to measures, such as patches, that should have been taken previously," noted the Information Commissioner’s Office of the United Kingdom earlier this year. When issuing the guidance, the ICO also issued a €400,000 fine to a retailer that had not patched its software in six years.

Similarly, the NY DFS regulations specifically require companies to maintain an application security program. That’s a dramatic change in a world where 451 Research notes that only 15% of the total cybersecurity spend is for application security solutions compared to 37% for network security.

Yet, the #1 target of cyberattacks these days are web applications, according to Verizon. Gartner says that 99% of the successful attacks against those apps involve vulnerabilities known for at least a year. One vulnerability management vendor reports that 88% of Java-based applications have at least one known flaw. Even Oracle acknowledges that that their customers run months, if not more than a year, behind in applying critical patch updates.

These new regulatory standards are exposing the difficulties DevOps and AppSec teams face in their tasks to keep consumer data safe. The need to comply is driving teams to evaluate new techniques and technologies that automate routine tasks so teams can focus on higher value activities.  CIOs and CISOs are also looking to apply proven technologies used elsewhere in Information Technology for new ways to improve security.

The reality is, the traditional approaches to cybersecurity are no longer adequate to the task. The policymakers behind the CCPA, GDPR and NY DFS have recognized that and are creating regulatory schemes that force organizations to take action before a security event. Now it’s time for the cybersecurity community to seize the opportunity to dramatically improve how we protect the vital information entrusted to us.

KEYWORDS: cyberattack data breach GDPR privacy concerns security budget security compliance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Adams is the CEO of Waratek, a leading application security company.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Biometric passwordless authentication

    What Microsoft’s shift to passwordless means for cybersecurity

    See More
  • internet of things

    California’s 'Other' Game-Changer: Complying with the New IoT Cybersecurity Law

    See More
  • Combating Complacency: Getting the Most Out of Your Data Breach Response Plan

    What U.S. companies should know about LGPD – Brazil’s new General Data Protection Law

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • March 30, 2012

    What's New with AXIS Camera Station

    AXIS Camera Station One is a software solution for the simultaneous viewing and recording of high-quality H.264, MPEG-4 and Motion JPEG video from a single surveillance camera.
  • February 20, 2012

    What's New with AXIS Camera Station

    AXIS Camera Station One is a software solution for the simultaneous viewing and recording of high-quality H.264, MPEG-4 and Motion JPEG video from a single surveillance camera. AXIS Camera Station One is specially designed for use with Axis video products, and delivers superior results on a Windows PC, with no recording limitations in software. It helps you deter intruders, secure your garage or garden, or monitor your back door.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing