article thumbnail

Optimizing PCI compliance in financial institutions

CIO

However, managing PCI security compliance across various lines of business within these institutions can be a complex and resource-intensive task. The CCA allows overarching enterprise functions and IT shared services to be assessed separately from the business unit’s products/applications that require PCI security compliance.

article thumbnail

What CIOs need to know about the newly proposed Critical Infrastructure Cyber Incident Reporting Rule

CIO

To do this requires more widespread awareness of cyber threats and information sharing, and a newly proposed cyber incident reporting rule from the Cybersecurity and Infrastructure Security Agency (“CISA”) is intended to meet this goal. Considering where you can decrease operational complexity to build in more capacity for reporting.

Report 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Colorado AI legislation further complicates compliance equation

CIO

The legislation requires companies that conduct business in Colorado to disclose to the state’s attorney general “any known or reasonably foreseeable risk of algorithmic discrimination, within 90 days after the discovery or receipt of a credible report.” Artificial Intelligence, Compliance, Regulation

article thumbnail

PCI compliance: The best defense is a great defense

CIO

Not surprisingly, Payment Card Industry Data Security Standard (PCI DSS) compliance is crucially important. Compliance with PCI DSS v4.0 is designed to help to defend against the three most common attack vectors identified in Verizon’s annual Data Breach Investigations Report (DBIR). Updating the PCI DSS is likewise critical.

article thumbnail

Monetization Monitor: Software Usage Analytics 2020

Usage Data’s Role in Compliance Efforts. Download the report now and see how your company compares. Discovering overuse of software (intentional or unintentional) can reduce revenue leakage, yet nearly half of suppliers are unaware of how much revenue they’re losing to piracy and overuse.

article thumbnail

PCI compliance: Is your qualified security assessor up to the task?

CIO

Does your QSA provide actionable insights and recommendations, or just a compliance report? Are they providing strategic guidance or simply providing a compliance report? An effective QSA is a partner who is able to help security and compliance teams better safeguard their systems, applications, devices and data.

article thumbnail

What is GRC? The rising importance of governance, risk, and compliance

CIO

As a result, managing risks and ensuring compliance to rules and regulations along with the governing mechanisms that guide and guard the organization on its mission have morphed from siloed duties to a collective discipline called GRC. What is GRC? GRC is overarching.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

This IDC report addresses several key topics: Risks involved with using open-source software (OSS) How to manage these risks, including OSS license compliance Business benefits to the organization beyond risk mitigation Software supply chain best practices Key trends in industry and government regulation