
February 14, 2026
If you’ve been treating GDPR as the ultimate goal in your security journey, Episode 52 of ChatDPS might challenge that thinking. This week’s discussion unpacks the latest DLA Piper GDPR report and explores a critical question facing organisations worldwide:
Is compliance enough to keep you secure? The short answer? No.
Compliance may protect you from regulatory penalties. It does not automatically protect you from breaches. And that distinction matters more than ever.
When GDPR was introduced, many organisations viewed it as a regional regulatory hurdle. Today, it has become something far bigger — a global privacy blueprint.
Countries around the world have borrowed heavily from its principles when drafting their own data protection laws. GDPR has effectively reshaped the global conversation about privacy, accountability, and personal data rights.
But here’s the problem:
Too many organisations still treat GDPR as a checklist exercise. Policies are written. Training is delivered. Certifications are displayed. Dashboards are green.
Yet the deeper questions often go unexamined:
GDPR was never meant to be a paperwork exercise. It was designed to change how organisations think about data. And that mindset shift is where many are still falling short.

One of the most important takeaways from Episode 52 was this: Being compliant does not mean being secure.
Organisations proudly showcase ISO 27001 certifications and audit reports, yet still suffer major breaches. Why? Because compliance frameworks often validate the presence of controls — not the effectiveness of them.
Historically, you could demonstrate that a policy existed without proving it worked under pressure. That creates a dangerous illusion of safety.
As Adam put it during the episode, many organisations end up “running after the bouncing ball” — chasing the next framework, the next audit, the next badge — instead of stepping back and focusing on fundamentals. True security isn’t built on certificates. It’s built on clarity.
That means understanding:
Compliance might get you through an audit. It won’t necessarily get you through a breach.
Another key theme in the episode was supply chain security — an issue that is no longer a footnote in risk registers. It’s front-page material.
Modern businesses are deeply interconnected. Vendors, SaaS platforms, contractors, managed service providers — each integration expands your attack surface. When a partner is breached, the consequences don’t stay contained.
The alleged Nike breach, widely reported, illustrates how third-party involvement can create ripple effects across systems and organisations. Even if your own controls are strong, vulnerabilities in a supplier’s environment can quickly become your problem.
You are not judged solely on your own security posture. You are judged on the resilience of your ecosystem.
That reality changes the conversation from “Are we compliant?” to “Are we resilient?”
Perhaps the most sobering point in Episode 52 was the discussion around leadership accountability. Regulators are no longer focusing exclusively on IT departments. Increasingly, scrutiny is directed at directors and executive leadership.
If a breach occurs, key questions may include:
In some jurisdictions, personal liability for directors and officers is no longer theoretical. Cybersecurity is not just an operational issue. It is a governance issue.
And governance lives at the top.
Organisations that treat cyber risk as a back-office technical problem are exposing themselves to more than operational disruption. They may be exposing leadership to regulatory and legal consequences.
Compliance is not meaningless. It provides structure, accountability, and baseline standards. But it was never designed to be the finish line.
Security maturity requires something deeper:
Compliance asks, “Do you meet the standard?” Resilience asks, “Can you withstand impact?”
That’s a far more important question.
Episode 52 delivers a simple but powerful message:
Stop aiming for compliant. Start aiming for resilient.
The organisations that thrive in today’s threat landscape are not the ones with the most certificates. They are the ones with the clearest understanding of their data, their dependencies, and their risk exposure.
If you only focus on passing the audit, you may miss the vulnerabilities that matter most.
GDPR was never meant to be the finish line.
It was meant to be the starting point.