Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Unprepared for CCPA? It Could Cost Your Organization

Here’s how to achieve compliance and potentially cut costs at the same time

By Safi Raza
SEC0919-Assurance-Feat-slide1_900px
February 25, 2020

Studies and surveys consistently show that cybersecurity and data protection is one of the top five concerns of internal auditors, who worry that their organizations lack the internal resources to deal with security risks. On January 1, 2020, the California Consumer Privacy Act (CCPA) became effective, requiring new data privacy measures at most US organizations. Yet it is estimated that less than 10 percent are fully prepared for compliance with CCPA. Unfortunately, in this case, ignorance is not bliss and may result in hefty fines.

As regulators are recognizing the importance of data privacy and implementing rules to protect consumers’ data, organizations must take appropriate measures to protect their customers and stay compliant. In doing so, they can not only improve their business processes and reduce their business risks, but they can potentially achieve significant cost savings.

The initial steps towards compliance are understanding the regulation and evaluating if and how it impacts your organization. To determine whether CCPA applies, an organization that does any business in California should ask: Do we collect and sell consumer information? Do we generate at least 50 percent of income by selling consumer data? Does the annual revenue exceed $25 million? If the answer to any of these questions is yes, then the organization must comply with CCPA.

The next step toward compliance is evaluating which data, processes and assets are impacted by CCPA. These assets could be in the form of stored data or processes that are associated with the data. The question is, of this data, what needs to be protected?

Once an organization has identified what needs to be protected, it must decide how it will protect the data assets and whether protection measures fulfill its CCPA requirements. The object is not to be simply running a checklist but preserving and protecting the required data. In most cases, businesses will need to hire staff and invest in technology for data discovery and possibly re-architect the workflows to ensure compliance. That will be an added cost, but the cost of non-compliance could be much higher.

Additional technology may be required for data discovery and data mapping. Processes will need to be analyzed to ensure that data access is secured, that the integrity of the data is intact, and that the data availability is certain. It is recommended that organizations employ independent professional services and/or auditors to review the systems and the processes as well as assist with ensuring adequate documentation. Hiring an outside service is also an added cost – but, again, the cost is negligible when compared to potential fines for non-compliance.

Another consideration for greater data protection, security and compliance – at a reduced cost –  is to look to the cloud. The adoption of cloud services has reduced the cost of information security, business continuity and privacy protection. The concept of “On-Prem” technology is fading away as businesses realize that they can outsource these responsibilities to cloud service providers instead of maintaining their own data centers and employing large IT staffs. Cloud services are now able to offer heavily secured global data centers to ensure real-time data replication and redundancy. Many businesses that were previously unable to leverage cutting edge technologies due to the high cost are now able to employ them as costs are shared between many subscribers on a public cloud. Those who still are not convinced can utilize a private cloud at higher costs.

Industry associations and government agencies have provided much-needed help in standardizing the compliance measures for CCPA. For instance, the International Information System Security Certification Consortium (ISC) has assisted its members in complying with GDPR in Europe and CCPA by conducting workshops, seminars, webinars and training. ISC has provided opportunities for businesses, legal advisors, and technologists to come together and tackle the problems as a group. The National Institute of Standards and Technology (NIST) and the Information Technology Infrastructure Library (ITIL) has produced valuable guidelines to assist organizations in creating secure and stable systems.

Finally, internal auditors working to achieve CCPA compliance need to achieve “buy-in” from their organization’s CEO, CISO, senior management and boards – who ultimately sign the checks for the CCPA compliance program. A holistic approach to security risk management is the best approach. Here are some best practices to consider:

  • Show how your proposed approach aligns with the overall business strategies and objectives.
  • Communicate with senior management on areas that directly impact their duties and oversight responsibility.
  • Focus on metrics affecting the entire organization, function, business line and geographic region. Demonstrate the long-term results expected from the compliance program.
  • Pitches for investments in new technology should be supported by noting changes in industry trends, business operations and customer service lines – as well as the cost-effectiveness of the investment.
  • A SWOT (strengths, weaknesses, opportunities, threats) analysis is an effective way to communicate the current state of the information security program.

Always highlight the risks versus rewards aspects of achieving compliance. Present a balanced message that builds credibility and the trust in the boardroom. Stick to the facts, present the data and act as the messenger. While at first it may appear that CCPA compliance is a big cost to swallow, in the long run, a conforming program will reduce the organization’s risk profile, increase its security, protect its reputation – and likely save money.

KEYWORDS: CCPA cyber security cybersecurity data compliance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Safi Raza is Director of Cybersecurity at Fusion Risk Management. He has more than 15 years’ experience in information security, is Director of Cybersecurity at Fusion Risk Management. Prior to joining Fusion, Safi spent 14 years at Rosenthal Collins Group, where he spent eight years in designing and implementing High Frequency Trading infrastructure and six years in information security. Safi was responsible for overseeing the e-Trading Services Department where he helped introduce, adapt and support new and improved trading technologies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Fraud and scams the evolving threat landscape for security professionals

    Preparing for the next elaborate cyberattack could put your organization at risk

    See More
  • cybersecurity risks

    Poor incident detection can cost your organization a fortune

    See More
  • Remote work costs companies between $5 and $10 million

    The cost of an unsecure remote environment to your organization? $5 to 10M

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing