Frequently Asked Questions

2025-2026 Compliance Changes & Frameworks

What were the most significant compliance framework updates in 2025?

In 2025, major updates included the accelerated adoption of NIST CSF 2.0, the publication of ISO 27701:2025, and substantial revisions to the OMB Compliance Supplement. Key frameworks impacted were GDPR (especially regarding AI), HIPAA, PCI DSS v4.0, and ISO 27001:2022. These changes emphasized risk management, cloud security, and executive accountability. Source

How did GDPR enforcement evolve in 2025 regarding AI?

European regulators issued expanded guidance on AI and personal data, clarified expectations for Data Protection Impact Assessments (DPIAs), and harmonized fine-calculation methodologies. No formal amendments were made, but enforcement focused on applying existing GDPR principles to AI-driven processing. Source

What changes were proposed for HIPAA in 2025?

Proposed HIPAA changes included enhancements to patient access rights, improvements to care coordination, and modernization of Notice of Privacy Practices (NPP) requirements. These updates were not yet enforceable as of late 2025. Healthcare organizations should monitor HHS rulemaking for future implementation. Source

What are the mandatory requirements for PCI DSS v4.0 as of March 2025?

PCI DSS v4.0 introduced mandatory requirements such as customized implementation controls, expanded multi-factor authentication (MFA) for all cardholder data environment access, and a shift to continuous monitoring and validation of security controls. Source

How did ISO 27001:2022 change from the previous version?

ISO 27001:2022 reduced the number of Annex A controls from 114 to 93, consolidated them into four themes, and added eleven new controls for emerging security needs. Attribute tagging was introduced for easier alignment with other frameworks. Certifications under the 2013 standard expired on October 31, 2025. Source

What additional frameworks saw major developments in 2025?

Other frameworks with notable updates included NIST CSF 2.0, ISO 27701:2025, OMB Compliance Supplement 2025, CMMC, FTC Safeguards Rule, HITRUST CSF v11, and the Cloud Security Alliance’s Cloud Control Matrix (CCM). These changes focused on privacy governance, federal award controls, and cloud security risks. Source

What compliance trends are expected for 2026 and beyond?

Compliance is expected to integrate more deeply with business strategy, with increased focus on AI governance (GDPR/EU AI Act), telehealth security (HIPAA), continuous compliance (PCI DSS), supply chain security (ISO 27001), and executive accountability. The UK’s proposed Cyber Resilience Bill signals stronger obligations for digital products and services. Source

How should organizations prepare for ongoing compliance changes?

Organizations should conduct regular risk assessments, embrace automation for evidence collection and reporting, standardize advisory services, and adopt a continuous compliance mindset with real-time visibility into controls. Source

How can service providers build a scalable compliance practice?

Service providers can leverage automation and standardized frameworks to manage compliance for more clients with fewer resources. Platforms like Cynomi act as a CISO copilot, automating risk assessments, remediation planning, and reporting to boost productivity and recurring revenue. Source

What is the role of executive accountability in modern compliance?

Regulators and clients increasingly expect clear executive ownership and ongoing risk management. Board-level accountability is now a critical component of compliance, especially in frameworks like NIST CSF 2.0 and GDPR. Source

How does Cynomi help organizations adapt to compliance changes?

Cynomi provides built-in expertise and intelligent workflows that automate risk assessments, remediation planning, and reporting. This enables organizations to reduce manual effort, boost productivity, and deliver high-impact services that strengthen client resilience and retention. Source

What is the importance of continuous compliance?

Continuous compliance moves organizations beyond point-in-time audits to real-time visibility and ongoing validation of controls. This approach is emphasized in PCI DSS v4.0 and is increasingly expected by regulators and clients. Source

How do cloud security and supply chain risk factor into new compliance standards?

Modern compliance standards, such as ISO 27001:2022 and the Cloud Security Alliance’s CCM, place greater emphasis on cloud-first environments, SaaS dependencies, and third-party/supply chain risk management. Source

What is the impact of the CMMC rule finalized in 2025?

The U.S. Department of Defense finalized the CMMC rule in 2025, launching a phased rollout that requires defense contractors to demonstrate specific cybersecurity maturity levels for handling Controlled Unclassified Information (CUI). Source

How did the FTC Safeguards Rule evolve in 2025?

Organizations continued adjusting to strengthened Safeguards Rule requirements that took effect in 2023 and 2024. In 2025, regulators issued additional guidance and increased enforcement activity. Source

What are the new requirements in ISO 27701:2025?

ISO 27701:2025 strengthened privacy governance requirements and clarified how a Privacy Information Management System (PIMS) can be implemented alongside ISO 27001 or independently. Source

How does Cynomi support compliance with multiple frameworks?

Cynomi supports over 30 cybersecurity frameworks, including NIST CSF, ISO/IEC 27001, GDPR, SOC 2, and HIPAA. The platform enables tailored assessments and automates compliance readiness, risk assessments, and reporting for diverse client needs. Source

What resources does Cynomi provide for compliance documentation?

Cynomi offers compliance checklists, risk assessment templates, incident response plan templates, and framework-specific mapping documentation. These resources help streamline compliance efforts and are available for frameworks like CMMC, PCI DSS, and NIST. CMMC Checklist, NIST Checklist

Features & Capabilities

What are the key features of Cynomi's platform?

Cynomi features AI-driven automation (automating up to 80% of manual processes), centralized multitenant management, compliance readiness across 30+ frameworks, embedded CISO-level expertise, branded reporting, scalability, and a security-first design. Source

How does Cynomi automate cybersecurity and compliance tasks?

Cynomi automates up to 80% of manual processes, including risk assessments, compliance readiness, and reporting. This reduces operational overhead and enables faster service delivery. Source

Does Cynomi support API integrations?

Yes, Cynomi offers API-level access for extended functionality and custom integrations with CI/CD tools, ticketing systems, SIEMs, and more. Source

What scanners and cloud platforms does Cynomi integrate with?

Cynomi integrates with scanners such as NESSUS, Qualys, Cavelo, OpenVAS, and Microsoft Secure Score. It also supports native integrations with AWS, Azure, and GCP, and can sync with infrastructure-as-code deployments. Source

How does Cynomi prioritize security over compliance?

Cynomi's security-first design links assessment results directly to risk reduction, ensuring robust protection against threats rather than focusing solely on compliance checklists. Source

What reporting capabilities does Cynomi offer?

Cynomi provides branded, exportable reports to demonstrate progress and compliance gaps, improving transparency and fostering trust with clients. Source

How does Cynomi help junior team members deliver high-quality work?

Cynomi embeds CISO-level expertise and best practices into its platform, enabling junior team members to deliver high-quality work and accelerating ramp-up time. Source

Is Cynomi easy to use for non-technical users?

Yes, Cynomi features an intuitive interface and structured workflows that guide even non-technical users through assessments, planning, and reporting. Customer feedback highlights its accessibility and ease of use. Source

How does Cynomi enable scalability for service providers?

Cynomi allows MSPs and MSSPs to scale their vCISO services without increasing resources, thanks to automation and process standardization. This ensures sustainable growth and efficiency. Source

Use Cases & Benefits

Who can benefit from using Cynomi?

Cynomi is purpose-built for Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs), and virtual Chief Information Security Officers (vCISOs). It is also valuable for organizations seeking scalable, consistent, and high-impact cybersecurity services. Source

What industries are represented in Cynomi's case studies?

Cynomi's case studies span the legal industry, cybersecurity service providers, technology consulting, managed service providers, and the defense sector. Examples include CompassMSP, Arctiq, CyberSherpas, CA2 Security, and Secure Cyber Defense. Testimonials, Arctiq Case Study

What measurable business outcomes have Cynomi customers reported?

Customers have reported increased revenue, reduced operational costs, and enhanced compliance. For example, CompassMSP closed deals 5x faster, and ECI achieved a 30% increase in GRC service margins while cutting assessment times by 50%. Source

How does Cynomi address common pain points for service providers?

Cynomi solves pain points such as time and budget constraints, manual processes, scalability issues, compliance and reporting complexities, lack of engagement tools, knowledge gaps, and consistency challenges by automating tasks and standardizing workflows. Source

What customer feedback has Cynomi received regarding ease of use?

Customers praise Cynomi for its intuitive design and accessibility for non-technical users. For example, James Oliverio (ideaBOX) described the platform as effortless, and Steve Bowman (Model Technology Solutions) noted ramp-up time for new team members was reduced from four or five months to just one month. Testimonials

How does Cynomi help organizations transition to subscription models?

Cynomi enables service providers to move from one-off engagements to subscription models by simplifying and streamlining work processes, as demonstrated by CyberSherpas and CA2 Security in their case studies. CyberSherpas Case Study

What is Cynomi's overarching mission and vision?

Cynomi's mission is to transform the vCISO space by enabling service providers to deliver scalable, consistent, and high-impact cybersecurity services without increasing headcount, empowering them to become trusted advisors and foster strong client relationships. About Cynomi

Competition & Comparison

How does Cynomi compare to Apptega?

Apptega serves both organizations and service providers, while Cynomi is purpose-built for MSPs, MSSPs, and vCISOs. Cynomi offers AI-driven automation, embedded CISO-level expertise, and supports 30+ frameworks, providing greater flexibility and reduced manual setup time. Source

How does Cynomi differ from ControlMap?

ControlMap requires moderate to high expertise and more manual setup, while Cynomi automates up to 80% of manual processes and embeds CISO-level expertise, allowing junior team members to deliver high-quality work. Source

What makes Cynomi different from Vanta?

Vanta is direct-to-business focused and best suited for in-house teams, with strong support for select frameworks. Cynomi is designed for service providers, offering multitenant management, scalability, and support for over 30 frameworks. Source

How does Cynomi compare to Secureframe?

Secureframe focuses on in-house compliance teams and requires significant expertise, with a compliance-first approach. Cynomi prioritizes security, links compliance gaps directly to security risks, and provides step-by-step, CISO-validated recommendations for easier adoption. Source

What are the advantages of Cynomi over Drata?

Drata is premium-priced and best suited for experienced in-house teams, with onboarding taking up to two months. Cynomi offers rapid setup with pre-configured automation flows and embedded expertise, allowing teams with limited cybersecurity backgrounds to perform sophisticated assessments. Source

How does Cynomi compare to RealCISO?

RealCISO has limited scope and lacks scanning capabilities. Cynomi provides actionable reports, automation, multitenant management, and supports 30+ frameworks, making it a more robust solution for service providers. Source

Technical Requirements & Documentation

What technical documentation does Cynomi provide for compliance readiness?

Cynomi provides guides and templates for NIS 2 Directive, CMMC 2.0, NIST compliance, continuous compliance, and framework-specific mapping. These resources help prospects understand and leverage Cynomi's capabilities for compliance and risk management. Compliance Readiness Assessment

Where can I find Cynomi's compliance checklists and templates?

Compliance checklists and templates for frameworks like CMMC, PCI DSS, and NIST are available on Cynomi's website. These include System Security Plans (SSP), Plan of Action and Milestones (POA&M), risk assessment templates, and incident response plan templates. CMMC Checklist, NIST Checklist

Does Cynomi provide documentation for vendor risk assessments?

Yes, Cynomi provides documentation required for third-party agreements and vendor risk assessments, including contracts with security clauses and shared responsibility matrices. CMMC Compliance Checklist

How does Cynomi help with continuous compliance?

Cynomi offers a comprehensive guide on achieving scalable, always-on compliance with automation, available at its Continuous Compliance Guide. Continuous Compliance Guide

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Getting to YES: The Anti-Sales Guide to Closing New Cybersecurity Deals

Download Guide

What the Last Year of Compliance Changes Means for 2026

Dror-Hevlin
Dror Hevlin Publication date: 19 December, 2025
Compliance
What the Last Year of Compliance Changes Means for 2026

In 2025, organizations across all sectors navigated a significant wave of updates to cybersecurity and privacy compliance frameworks. As digital threats evolved, regulators responded with new requirements, major transition deadlines, and heightened enforcement, making swift adaptation essential. For service providers, staying proactive with compliance was the key to avoiding penalties, building resilience, maintaining stakeholder trust, and creating a foundation for growth. Key shifts included greater demands in risk management, cloud security, and executive accountability, moving the focus from mere documentation to demonstrable oversight. 

The year’s most significant milestones included the accelerated adoption of NIST CSF 2.0, the publication of the revised ISO 27701:2025 privacy standard, and substantial revisions to the OMB Compliance Supplement. Evolving requirements also impacted CMMC, the FTC Safeguards Rule, and the HITRUST Common Security Framework. For CISOs and cybersecurity leaders, these changes marked a critical shift toward board-level accountability, with regulators and clients expecting clear executive ownership and ongoing risk management. Understanding and adapting to this new baseline is crucial for standardizing compliance, supporting clients effectively, and preparing for future regulatory expectations.  

Below, we break down the most impactful compliance changes of 2025 and the steps you need to take as a service provider to help your clients stay ahead in 2026. 

Summary of 2025 Compliance Framework Updates 

In 2025, several important adjustments, transition deadlines, and enforcement trends shaped key compliance frameworks. Each had distinct implications for businesses. 

GDPR and AI 

In 2025, European regulators intensified their focus on how organizations use AI under the GDPR. Regulators did not introduce formal amendments to the regulation. Instead, they clarified expectations through new guidance, opinions, and enforcement activity. These developments should be viewed separately from the EU AI Act, which introduced new obligations, while GDPR enforcement in 2025 focused on applying existing principles to AI-driven processing. 

Key developments include: 

  • Expanded regulatory guidance on AI and personal data, issued by the European Data Protection Board and national data protection authorities, clarifying how existing GDPR principles apply to AI systems. AI use cases increasingly require formal inventories, lawful basis documentation, DPIAs, and executive visibility, even where AI systems are internally developed. 
  • Increased expectations around Data Protection Impact Assessments (DPIAs) for AI use cases that qualify as high-risk processing, reinforcing long-standing GDPR obligations rather than introducing new ones. 
  • Continued reliance on modernized Standard Contractual Clauses (SCCs) for international data transfers, which became mandatory in earlier years but remained central to enforcement in 2025. 
  • More consistent fine-calculation methodologies across the EU, reflecting harmonization efforts adopted prior to 2025 and applied more uniformly in regulatory actions. 

Together, these developments made 2025 a year of heightened scrutiny and clearer expectations for AI governance under the GDPR. 

HIPAA 

In 2025, HIPAA compliance continued to evolve, although comprehensive updates to the Privacy Rule had not yet been finalized. 

Key areas under consideration include: 

  • Proposed enhancements to patient access rights, including shorter response timelines for access requests. 
  • Planned improvements to care coordination and case management, aimed at reducing administrative barriers to information sharing. 
  • Modernization of Notice of Privacy Practices (NPP) requirements, intended to improve transparency and patient understanding. 

While these changes remain proposed rather than enforceable as of late 2025, healthcare organizations should monitor HHS rulemaking closely and prepare for future implementation. 

PCI DSS v4.0  

While PCI DSS v4.0 was released in 2022, several key requirements became mandatory in March 2025 after a lengthy transition period. These are not minor tweaks. They represent a fundamental shift toward a more security-focused, continuous compliance model. 

Key changes include: 

  • Customized Implementation: The new standard allows organizations to meet security objectives through customized controls, but this requires robust risk analysis and documentation to demonstrate their effectiveness. 
  • Enhanced Authentication: Multi-factor authentication (MFA) requirements were expanded to cover all access to the cardholder data environment, not just administrator access. 
  • Continuous Monitoring: The focus shifted from annual, point-in-time assessments to continuous monitoring and validation of security controls throughout the year. 

ISO 27001:2022 

Similar to PCI DSS, the transition period for organizations to move from ISO 27001:2013 to ISO 27001:2022 ends in 2025. Since October 31, 2025, certifications issued under the 2013 standard are no longer valid. 

The updated standard introduces a streamlined control set and places greater emphasis on modern cybersecurity challenges. 

Key changes include: 

  • Updated Annex A Controls: The number of controls has been reduced from 114 to 93, consolidated into four themes. The themes are Organizational, People, Physical, and Technological. 
  • New Controls: Eleven new controls address emerging security needs, including threat intelligence, data leakage prevention, and cloud service security. 
  • Attribute Tagging: Controls can now be categorized by attributes, such as control type and security properties. This makes it easier to align an ISMS with other frameworks. 

These changes better reflect cloud-first environments, SaaS dependencies, and the growing importance of third-party and supply chain risk management. 

Additional Framework Developments in 2025 

In addition to major changes in GDPR, HIPAA, PCI DSS, and ISO 27001, 2025 saw notable developments across other frameworks: 

  • NIST Cybersecurity Framework 2.0 (CSF 2.0): Although released in 2024, adoption accelerated in 2025. Organizations increasingly aligned to the new “Govern” function and integrated cybersecurity governance into enterprise risk management. 
  • ISO 27701:2025: ISO published a revised version of ISO 27701 in 2025. The revision strengthened privacy governance requirements and clarified how a Privacy Information Management System (PIMS) can be implemented alongside ISO 27001 or implemented more independently. 
  • OMB Compliance Supplement 2025: Significant updates were introduced for Single Audit requirements and federal award internal controls, affecting organizations that receive federal funding. 
  • Cybersecurity Maturity Model Certification (CMMC): In 2025, the U.S. Department of Defense finalized the CMMC rule. The final rule launched a phased rollout that will require defense contractors to demonstrate specific cybersecurity maturity levels for handling Controlled Unclassified Information (CUI). 
  • FTC Safeguards Rule: Organizations continued adjusting to strengthened Safeguards Rule requirements that took effect in 2023 and 2024. In 2025, regulators issued additional guidance and enforcement activity increased. 
  • HITRUST Common Security Framework (CSF): HITRUST continued its transition to CSF v11, with 2025 serving as a key milestone year for organizations migrating away from earlier versions. 
  • Cloud Security Alliance’s Cloud Control Matrix (CCM): The CSA released updates to the CCM in 2025. The updates refined controls to address emerging cloud security risks and evolving regulatory expectations. 

What to Expect in 2026 and Beyond 

Looking ahead, compliance will continue evolving toward deeper integration with core business strategy. Several trends are expected to gain momentum: 

  • GDPR: Regulators are likely to focus more closely on AI governance and cross-regulatory alignment with the EU AI Act. This will increase complexity for AI-driven organizations. 
  • HIPAA: The continued growth of telehealth and connected health technologies may drive new guidance on securing PHI outside traditional healthcare environments. 
  • PCI DSS: The emphasis on continuous compliance under v4.0 will mature. Additional guidance is expected around customized implementations and ongoing validation. 
  • ISO 27001: As adoption of the 2022 standard increases, organizations may see greater emphasis on supply chain security, cloud-native environments, and integration with broader risk management programs. 
  • Accountability: Across regions, governments are increasing expectations around cyber resilience and executive accountability. In the UK, the proposed Cyber Resilience Bill signals a move toward stronger security obligations for digital products and services, complementing broader EU trends in AI and cybersecurity regulation. 

How to Prepare for Compliance Changes 

Navigating this complex landscape requires a structured, strategic approach. 

  • Conduct Regular Risk Assessments: Understanding your and your clients’ current compliance posture is foundational. Regular, automated assessments help identify gaps and prioritize remediation. 
  • Embrace Automation: Manual compliance management is no longer scalable. Centralized platforms can automate evidence collection, policy management, and reporting while improving consistency. 
  • Standardize Your Advisory Services: A repeatable compliance framework enables delivery of high-quality, CISO-level services efficiently, even with lean teams. 
  • Adopt a Continuous Compliance Mindset: Move beyond point-in-time audits by implementing tools that provide real-time visibility into controls and compliance status. 

Build a Scalable Compliance Practice 

Staying informed about compliance updates is only the first step. The real opportunity lies in translating regulatory complexity into scalable, profitable services. By leveraging automation and standardized frameworks, organizations can manage compliance for more clients with fewer resources. 

Platforms like Cynomi act as a CISO copilot, delivering built-in expertise and intelligent workflows that streamline cybersecurity and compliance management in order to increase recurring revenue, and improve efficiency. By automating risk assessments, remediation planning, and reporting, teams can reduce manual effort, boost productivity, and deliver high-impact services that strengthen client resilience and retention. Learn more at www.cynomi.com.Shape