It’s hard to believe that over a decade has passed since PCI DSS (Payment Card Industry Data Security Standard) was first introduced in 2004 as the information security standard for organizations that store, process or transmit cardholder data. Although it’s become a mature industry standard, two problems remain.
While many biometric modalities have been tried at the ATM, fingerprint biometrics has become one of the most widely used, partly because of its long history, but more importantly for its ease of use, performance, interoperability, ability to thwart imposters and low cost.
After the leak of the Panama Papers and a string of ransomware attacks, will these new developments lead to new priorities for lawyers, doctors and enterprises at large? Can financial losses or the damage to the reputation of a health system or law firm lead to a new sense of urgency to update accepted security practices and even codes of conduct with hospital data? Will regulatory bodies mandate more training for these two distinguished professions that have largely opted out of serious cybersecurity training up until now?
DOJ and SEC statements driving CCO concerns over changes in compliance regulations and scrutiny
April 18, 2016
Eighty-one percent of compliance officers have increased apprehension when it comes to their personal liability in situations of corporate misconduct, according to a new survey released by lawfirm DLA Piper. This uneasy adjustment stems from shifts in tone from Washington, DC, including the appointment of Hui Chen as the Justice Department’s first compliance counsel, and the release of the Yates Memo outlining a plan to prosecute individual corporate employees and incentivize reforms, according to the 2016 Compliance Risk Report: CCOs Under Scrutiny.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!