When Geopolitics Writes Your Compliance Roadmap
Cyber policy has always lagged cyber reality. Regulations arrive after breaches, frameworks emerge after failures, and accountability structures materialize long after the damage lands on someone else’s balance sheet.
[…Keep reading]
NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work
Cyber policy has always lagged cyber reality. Regulations arrive after breaches, frameworks emerge after failures, and accountability structures materialize long after the damage lands on someone else’s balance sheet. NCC Group’s fifth edition of its Global Cyber Policy Radar suggests that cycle is finally breaking — not because governments have gotten smarter, but because the stakes have grown too large to ignore.The report lands at a moment when geopolitical fracture lines are reshaping the regulatory landscape faster than most compliance programs can track. Three forces drive the transformation: digital sovereignty fragmenting the global technology stack, AI security governance embedding itself into existing cyber frameworks rather than spawning new standalone laws, and board-level accountability shifting from aspiration to legal requirement. None of these trends operate independently. Together, they define a fundamentally different operating environment for the organizations trying to navigate all three simultaneously.The Sovereignty TrapDigital sovereignty has become one of those phrases that means everything and therefore risks meaning nothing. Governments invoke digital sovereignty to justify procurement restrictions, data localization mandates, supply chain controls, and preferential treatment for domestic technology providers — sometimes simultaneously, rarely with a coherent shared rulebook.NCC Group maps the actual regulatory outputs: the EU’s Cybersecurity Act revisions planning to phase out high-risk third-country ICT vendors from critical infrastructure, U.S. rules banning Chinese and Russian software and hardware in connected vehicles effective 2027, and the broader U.S. commitment to moving away from adversary vendors entirely. Australia, the UK, Singapore, and South Korea pursue parallel tracks with varying levels of specificity and enforcement ambition.The operational implication for global organizations isn’t abstract. Technology stacks that made economic sense under a unified global market now carry regulatory risk in a fragmented one. Supply chain decisions that once turned on performance and price carry geopolitical exposure that boards don’t yet have the vocabulary to evaluate. Organizations anchoring their sovereignty response to political buzzwords rather than actual risk will find themselves caught between jurisdictions with conflicting requirements and no clear path through either.AI Governance Without an AI LawThe sweeping AI Acts that seemed inevitable two years ago largely won’t materialize in the comprehensive form once anticipated. Governments have concluded that grafting AI governance onto existing cyber resilience frameworks is more tractable than building parallel regulatory architectures from scratch.That conclusion has direct consequences. The UK’s Cyber Assessment Framework now explicitly incorporates AI-related cyber risks. Australia embedded Responsible AI requirements in its public sector procurement framework through December 2025 updates to its Information Security Manual. The EU’s Digital Omnibus delays high-risk AI obligations until supporting technical standards exist — pushing implementation toward 2027-28 — while still expecting organizations to demonstrate security controls over AI systems through existing NIS2 and DORA obligations.The practical takeaway is that regulators won’t demand a dedicated AI compliance posture so much as evidence that AI systems receive the same security rigor applied to the rest of the digital estate. Organizations that treat AI security as a separate workstream from their broader cyber resilience program will find themselves exposed when regulators look under the hood.The Board Has Run Out of ExcusesThe third force is also the most consequential for how security investments get approved. Governments across multiple jurisdictions have moved beyond encouraging boards to take cyber seriously and started legislating it.The EU’s DORA and NIS2 already impose personal liability on senior management. The UK’s Cyber Security and Resilience Bill is expected to include explicit board-level responsibility for critical infrastructure operators and managed service providers. South Korea’s proposed updates to its Network Act and Personal Information Protection Act strengthen personal accountability for CEOs and CISOs. Israel’s draft National Cyber Law includes criminal sanctions for leaders at essential organizations who refuse to comply with emergency instructions.This convergence changes the CISO’s position inside the organization. Investment decisions that once required extended advocacy now carry regulatory urgency that CFOs and CEOs understand without translation. The challenge shifts from making the case for investment to ensuring security governance evidence reaches boards in a form they can evaluate and attest to. Forrester’s 2026 security benchmark data cited in the report reveals that only 15% of enterprise security decision-makers prioritize board-level communication as a strategic priority — a gap that regulators are actively closing.The Offensive Cyber ComplicationThreading through all three regulatory shifts is a development that compliance frameworks haven’t caught up with: the normalization of state-sponsored offensive cyber operations. France, the Netherlands, Germany, and Denmark have each taken concrete steps to expand offensive capabilities, while the U.S.’s Cyber Strategy adopts an explicitly offense-forward posture that includes incentivizing private sector participation in disrupting adversary networks.For organizations, this creates a governance question that sits above the typical security program scope. When governments call on private companies to support offensive campaigns — or when adversary-targeted infrastructure runs on privately owned networks — where does defense end and active cooperation begin? The legal cover, board authorization, and governance structures required to answer that question don’t yet exist in most organizations. Building them belongs on the agenda now, before someone else makes that decision on your behalf.NCC Group’s report frames this as a moment requiring proactive engagement rather than reactive compliance. Organizations that build evidence-led resilience programs, clarify their positions on public-private cooperation, and equip boards to navigate the intersection of cyber risk, geopolitics, and regulation will operate from a position of advantage. Those waiting for the landscape to stabilize before acting will find the window has already closed.
