With industry-specific compliance requirements driving security spending and deployment, it's natural to assume that best practices for securing access to sensitive data are different from vertical to vertical. However, that assumption may be changing.