ChatDPS

Episode 52: GDPR, Cybersecurity & Why Compliance Isn’t Enough

If you’ve been treating GDPR as the ultimate goal in your security journey, Episode 52 of ChatDPS might challenge that thinking. This week’s discussion unpacks the latest DLA Piper GDPR report and explores a critical question facing organisations worldwide:

Is compliance enough to keep you secure? The short answer? No.

Compliance may protect you from regulatory penalties. It does not automatically protect you from breaches. And that distinction matters more than ever.

GDPR: From European Regulation to Global Standard

When GDPR was introduced, many organisations viewed it as a regional regulatory hurdle. Today, it has become something far bigger — a global privacy blueprint.

Countries around the world have borrowed heavily from its principles when drafting their own data protection laws. GDPR has effectively reshaped the global conversation about privacy, accountability, and personal data rights.

But here’s the problem:

Too many organisations still treat GDPR as a checklist exercise. Policies are written. Training is delivered. Certifications are displayed. Dashboards are green.

Yet the deeper questions often go unexamined:

  • Where exactly is our data stored?
  • Who truly has access to it?
  • How is it being protected in practice?
  • Can we detect misuse quickly?

GDPR was never meant to be a paperwork exercise. It was designed to change how organisations think about data. And that mindset shift is where many are still falling short.

“If you asked yourself three questions — where is my data, how am I protecting it, and who can access it — you’d be far further along than any compliance project.”
Adam Cunningham

Compliance Does Not Equal Security

One of the most important takeaways from Episode 52 was this: Being compliant does not mean being secure.

Organisations proudly showcase ISO 27001 certifications and audit reports, yet still suffer major breaches. Why? Because compliance frameworks often validate the presence of controls — not the effectiveness of them.

Historically, you could demonstrate that a policy existed without proving it worked under pressure. That creates a dangerous illusion of safety.

As Adam put it during the episode, many organisations end up “running after the bouncing ball” — chasing the next framework, the next audit, the next badge — instead of stepping back and focusing on fundamentals. True security isn’t built on certificates. It’s built on clarity.

That means understanding:

  • Where your critical data lives
  • How it moves through your systems
  • Who touches it
  • How quickly you can detect anomalies
  • How well your controls perform during real incidents

Compliance might get you through an audit. It won’t necessarily get you through a breach.

Supply Chain Risk: The Weakest Link Problem

Another key theme in the episode was supply chain security — an issue that is no longer a footnote in risk registers. It’s front-page material.

Modern businesses are deeply interconnected. Vendors, SaaS platforms, contractors, managed service providers — each integration expands your attack surface. When a partner is breached, the consequences don’t stay contained.

The alleged Nike breach, widely reported, illustrates how third-party involvement can create ripple effects across systems and organisations. Even if your own controls are strong, vulnerabilities in a supplier’s environment can quickly become your problem.

You are not judged solely on your own security posture. You are judged on the resilience of your ecosystem.

That reality changes the conversation from “Are we compliant?” to “Are we resilient?”

Cybersecurity Has Moved Into the Boardroom

Perhaps the most sobering point in Episode 52 was the discussion around leadership accountability. Regulators are no longer focusing exclusively on IT departments. Increasingly, scrutiny is directed at directors and executive leadership.

If a breach occurs, key questions may include:

  • Did the board understand the cyber risk landscape?
  • Was cybersecurity treated as a strategic priority?
  • Were investments made based on informed decisions?
  • Were warnings ignored?

In some jurisdictions, personal liability for directors and officers is no longer theoretical. Cybersecurity is not just an operational issue. It is a governance issue.

And governance lives at the top.

Organisations that treat cyber risk as a back-office technical problem are exposing themselves to more than operational disruption. They may be exposing leadership to regulatory and legal consequences.

Rethinking the Goal: From Compliance to Resilience

Compliance is not meaningless. It provides structure, accountability, and baseline standards. But it was never designed to be the finish line.

Security maturity requires something deeper:

  • Clear visibility into data flows
  • Continuous validation of controls
  • Strong supply chain oversight
  • Executive-level engagement
  • A culture that prioritises risk awareness

Compliance asks, “Do you meet the standard?” Resilience asks, “Can you withstand impact?”

That’s a far more important question.

Episode 52 delivers a simple but powerful message:

Stop aiming for compliant. Start aiming for resilient.

The organisations that thrive in today’s threat landscape are not the ones with the most certificates. They are the ones with the clearest understanding of their data, their dependencies, and their risk exposure.

If you only focus on passing the audit, you may miss the vulnerabilities that matter most.

GDPR was never meant to be the finish line.

It was meant to be the starting point.