Identifying which regulations apply to your organization requires mapping three key factors: your industry, your geographic footprint, and the types of data you handle.
Healthcare organizations face HIPAA requirements. Financial services firms must comply with PCI-DSS and sector-specific regulations. Government contractors navigate FedRAMP requirements, with additional obligations for DOD work through DISA and even more stringent controls when supporting intelligence community operations.
James Yeager, who leads public sector operations at Abnormal AI, emphasized the layered nature of government compliance in the webinar: "FedRAMP... or advanced compliance thresholds through DISA for DOD, like impact levels, controls that are even more stringent when you talk about supporting the intelligence community."
Email remains the channel where compliance obligations most frequently converge. Phishing, business email compromise (BEC), and misdirected emails trigger breach notification requirements, HIPAA violations, and data loss incidents that regulators scrutinize closely. According to the Verizon 2025 DBIR, email serves as the attack vector in 27% of breaches, while BEC alone accounted for $2.77 billion in FBI-reported losses in 2024. For compliance teams, this means email security isn't just a technical concern—it's where regulatory exposure concentrates.
A decision-tree approach helps clarify obligations. Start with your primary industry vertical, then layer in geographic requirements based on where you operate and where your customers reside. Finally, classify the data types you handle to identify data-specific regulations.
This mapping exercise isn't a one-time activity. As your organization expands into new markets or handles new data types, your regulatory obligations will expand accordingly.