Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Embracing Regulatory Compliance in Identity & Access

One Identity
04/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Regulatory compliance frameworks are proliferating globally, with governments writing increasingly specific laws that carry severe penalties including seven-figure fines and jail time for non-compliance.
  • Organizations face overlapping compliance requirements from broad frameworks (ISO 27001, NIST), regional regulations (NIS2, UK Telco Security Act), and vertical-specific mandates (PCI DSS, HIPAA) that must be managed holistically.
  • Compliance should be viewed as an opportunity rather than a burden—frameworks represent extensive research that organizations can leverage, and controls like privilege access management can be implemented in business-enabling ways.
  • A strategic approach involves dedicated compliance teams working with business analysts to identify where required controls can streamline operations and increase competitiveness rather than create friction.

The Evolving Compliance Landscape

This presentation examines the rapidly expanding regulatory compliance landscape in cybersecurity, tracing how governments worldwide are responding to digital transformation with increasingly stringent requirements. The discussion covers major frameworks including PCI DSS for finance, HIPAA for healthcare, and geographic regulations like the EU's NIS2 directive and the UK Telecommunications Security Act. A key observation is how compliance frameworks are becoming more specific and enforcement-focused, with penalties ranging from seven-figure fines to potential jail time under regulations like Sarbanes-Oxley. The speaker emphasizes that compliance represents a shift from reactive to proactive cybersecurity, with governments now recognizing that national security depends on securing private sector digital infrastructure.

Strategic Implementation Approach

The video outlines a practical framework for managing overlapping compliance requirements across multiple jurisdictions and industry verticals. Organizations typically face requirements from broad frameworks like ISO 27001 and NIST, regional regulations, and vertical-specific mandates simultaneously. The recommended approach involves establishing a dedicated compliance team that includes business analysts to identify opportunities for streamlining controls and enabling business operations rather than creating friction. Using privilege access management (PAM) as an example—required by PCI DSS, HIPAA, NIS2, and ISO 27001—the speaker demonstrates how compliance controls can be implemented in ways that enhance rather than hinder business productivity. The emphasis is on leveraging the extensive research already embedded in these frameworks rather than reinventing security practices.

Chapters

0:00 - Introduction and Compliance Philosophy
0:46 - Major Compliance Frameworks Overview
2:25 - Enforcement and Penalties
3:19 - UK Telecommunications Security Act
4:34 - Building a Compliance Team
6:06 - Business-Enabling Implementation
7:27 - Leveraging Framework Research

Key Quotes

0:09 "Regulatory compliance is not an exercise in being reactive in cybersecurity, it's an exercise in being proactive."
2:36 "There's jail time in some of them, Sarbanes-Oxley out of the whole Enron scandal, for example. You get less jail time for murder."
3:35 "Our national security actually relies on private sector telecommunications frameworks that we don't control. We kind of need to do something about that because if they're compromised, we're compromised."
7:21 "You can actually be compliant and increase revenue while doing it and be competitive with your competitors and take your business forward. Compliance is not something to be afraid of, it's something to be embraced."

Categories:
  • » Cybersecurity » Compliance & GRC
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Compliance & Governance
  • Identity & Access
  • Best Practices
  • Thought Leadership
  • Regulatory Compliance
  • Identity and Access Management
  • Privilege Access Management
  • Cybersecurity Frameworks
  • Risk Management
  • ISO 27001
  • PCI DSS
  • HIPAA
  • NIS2 Directive
  • Sarbanes-Oxley
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Embracing Regulatory Compliance in Identity & Access

              Upcoming Webinar Calendar

              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/16/2026
                11:00 AM
                04/16/2026
                Beyond the Alert – Building the Human Centric Agentic SOC
                https://www.truthinit.com/index.php/channel/1372/beyond-the-alert-–-building-the-human-centric-agentic-soc/
              • 04/21/2026
                02:00 PM
                04/21/2026
                How Purpose Brands scales IT with Zendesk ITAM
                https://www.truthinit.com/index.php/channel/1881/how-purpose-brands-scales-it-with-zendesk-itam/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/

              Upcoming Events

              • Apr
                15

                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                04/15/202601:00 PM ET
                • Apr
                  16

                  Beyond the Alert – Building the Human Centric Agentic SOC

                  04/16/202611:00 AM ET
                  • Apr
                    21

                    How Purpose Brands scales IT with Zendesk ITAM

                    04/21/202602:00 PM ET
                    • Apr
                      30

                      Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                      04/30/202610:00 AM ET
                      • Apr
                        30

                        The New Economics of VMware Exit

                        04/30/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version