X

GRC Software Is Powerful. It Still Needs a Pilot

For COOs and CFOs, frameworks such as ISO 27001, SOC 2, NIST CSF, the Essential Eight and CPS 234 are rarely just “security work”. They are operating model decisions. They shape how risk is owned, how evidence is produced, how third parties are governed, and how the business proves control under pressure. That is why GRC software matters. It is also why software alone is not enough.

That instinct is not wrong. In fact, it is often sensible. But it is incomplete.

The real executive mistake is not buying GRC software. It is assuming the software is the governance model.

ISO 27001 remains the clearest example of why this distinction matters. The standard is not a request for more documents. It is a requirement to establish, implement, maintain and continually improve an information security management system. In other words, it asks an organisation to run security as a management discipline, not as a filing exercise. NIST made a similar point when it introduced the new Govern function in CSF 2.0, explicitly positioning governance as the mechanism that sets risk strategy, expectations and policy for the rest of the framework.

That framing matters to COOs and CFOs because these frameworks increasingly overlap. A SaaS provider may need ISO 27001 for customers, SOC 2 for US market expectations, NIST CSF as a board-friendly way to organise cyber risk, and the Essential Eight as a practical baseline for technical controls in Australia. An APRA-regulated entity has an additional burden: CPS 234 requires information security capability commensurate with threats, annual testing of controls, and internal audit review of both design and operating effectiveness, including controls managed by related parties and third parties. None of this is merely a security team concern. It is operational governance, assurance, supplier management and executive accountability.

This is the part that good GRC software genuinely improves. It can centralise obligations, map controls across multiple frameworks, collect evidence more consistently, assign ownership, track exceptions, support reviews, and reduce the administrative waste of scattered spreadsheets, screenshots and inbox chains. For an operating executive, that means less friction. For a finance executive, that means lower manual overhead, clearer lines of responsibility, and a better chance of producing reliable assurance without building an army of coordinators.

Yet software still does not answer the hardest questions.

What is truly in scope, and what is merely convenient to include? Which controls are mandatory, and which are being inherited, deferred or risk-accepted? Which exceptions are temporary, and which are actually signs of a process that is failing in slow motion? What counts as operating evidence, rather than ceremonial paperwork? Which third parties are genuinely material? Where does cyber risk become privacy risk, contractual risk, financial risk or business interruption risk? These are not software questions. They are leadership questions.

That gap between coordination and judgement is becoming more expensive. IBM’s 2024 Cost of a Data Breach Report put the global average cost of a breach at USD 4.88 million, the highest figure the report had recorded at the time. In Australia, the OAIC recorded 1,113 data breach notifications in 2024, a 25 per cent increase from 2023, while malicious or criminal attacks remained the largest source of notifications. Verizon’s 2025 DBIR adds a further operational warning: the human element was involved in roughly 60 per cent of breaches, and third-party involvement doubled from 15 per cent to 30 per cent year on year. For a COO or CFO, those are not abstract cyber statistics. They point directly to control ownership, workforce behaviour, third-party dependency, and the cost of weak governance around ordinary business processes.

Consider a common pattern.

One business buys a GRC platform early. Six months later, its dashboard looks respectable. Policies are loaded. Control owners are listed. There are workflows for reviews, exceptions and risk acceptance. But when an important customer asks how access reviews are actually being run across contractors, inherited cloud roles and emergency admin accounts, the answer becomes vague. The platform contains evidence of activity, but not a coherent operating story. Internal teams are not aligned on scope. Exceptions have accumulated quietly. Risk treatment decisions were made informally. The software is working, but the system is not.

A second business uses the same class of software very differently. Before trying to “complete the platform”, it clarifies scope, defines control ownership, aligns risk treatment with executive appetite, and decides which recurring reviews will exist because the business needs them, not merely because a workflow can be turned on. In that business, the software becomes useful because leadership has already decided what good looks like.

The contrast is not technical. It is managerial.

This is where COO and CFO concerns become sharper than the usual security narrative. COOs do not lose sleep because a risk register exists in the wrong tab. They worry about control failure becoming operational drag: onboarding delays, poor offboarding, vendor exceptions, patching backlogs, fragmented decision rights, and audit activity that interrupts delivery instead of strengthening it. CFOs look at the same environment and see cost leakage: duplicated effort, assurance debt, consulting churn, unmanaged supplier risk, weak evidence trails, and investment in tooling that never turns into durable capability.

That is why the language of “automation” can be misleading. Automation is useful, but the real question is authorship. Someone still has to author the operating intent of the system.

Someone must decide why the organisation is pursuing ISO 27001 or any adjacent framework in the first place. Is the purpose market access? Board confidence? M&A readiness? Insurance posture? Reduction in diligence fatigue? Operational discipline? All of the above? Someone must also decide what level of control maturity is proportionate to the business today. The Essential Eight itself is built around the idea of a target maturity level suited to the environment, then progressively implementing toward that target. That is a management judgement, not a software setting.

The same is true of third-party governance, which is becoming one of the defining concerns for executives. Verizon’s latest DBIR points to rising third-party involvement in breaches. CPS 234 explicitly requires assurance over controls maintained by related parties and third parties. SOC 2 exists in large part because customers need assurance over the controls operated by service organisations on their behalf. In plain English, the business now inherits risk from suppliers, SaaS platforms, outsourcers and partners at a scale that makes weak governance financially dangerous. A tool can track vendors, attestations and due dates. It cannot decide which third-party relationships deserve board attention, how much assurance is enough, or whether an exception is commercially tolerable.

There is also a distinctly Australian operational reality here. The ACSC’s guidance on the Essential Eight is explicit that organisations should choose a target maturity suitable for their environment and then progressively implement toward it. The OAIC’s notification data keeps reinforcing that privacy harm is no longer a remote edge case. ACSC reporting still shows cybercrime at a national scale, with more than 87,400 cybercrime reports in FY2023-24, or about one every six minutes. That should matter to finance and operations leaders because it means governance frameworks are no longer just external badges. They are part of how a business remains insurable, supportable and investable under ordinary conditions.

This is the context in which the word pilot becomes useful.

GRC software can be an excellent copilot. It can surface overdue actions, centralise evidence, improve traceability, and help management see where declared control intent does not match reality. But it is still a copilot. It does not set direction. It does not resolve trade-offs between risk, speed and cost. It does not coach overloaded control owners. It does not challenge a weak scope decision. It does not tell a CFO that an apparently cheap shortcut is likely to become expensive during audit, customer diligence or incident response. It does not tell a COO that policy sprawl is masking a process design problem.

A pilot does those things.

In our view, that is the real role of a working operating model such as SecureOS, and of a Sheep Dog vCISO sitting around the leadership table. The software remains important, but it is treated as instrumentation rather than authorship. SecureOS provides cadence, ownership, review discipline and commercial structure around the frameworks. The Sheep Dog vCISO provides judgement, translation and course correction, particularly where cyber risk crosses into operations, finance, supplier dependency and executive assurance. That is the point at which frameworks stop being parallel compliance projects and start behaving like a coherent system.

The future of GRC is not manual administration, and it is not blind faith in tooling. It is the combination of software, governance design and executive judgement. Organisations that mistake evidence collection for management will continue to spend heavily without gaining much confidence. Organisations that treat frameworks such as ISO 27001, NIST CSF, SOC 2, the Essential Eight and CPS 234 as operating disciplines, supported by software and steered by accountable leadership, will get something far more valuable than a clean audit trail.

They will get a business that can explain how it is governed, prove that controls are operating, and make better decisions when the pressure is on.

And that, more than any dashboard, is what COOs and CFOs are actually looking for.

0 0 votes
Article Rating
Ashley: