SYED husssain

Why a Risk Management Template Can’t Be The Only Answer

Research recently published by the Online Trust Alliance discovered that 90 percent of the data breaches that occurred in the first half of 2014 could have been […]

4 things to do after your credit card has been hacked

As many as 40 million Target shoppers who hit stores in the three weeks after Thanksgiving had their credit and debit card information stolen. If you’ve […]

Five Ways PCI DSS 3.2 Makes Security a Shared Responsibility

In 2005, CardSystems Solutions, which was a top payment processor for credit cards such as Visa, MasterCard, and American Express, was hacked. The consequences were enormous: […]

Six Ways PCI DSS 3.2 Impacts Vendor Risk with Payment Application Developers

In 2012, Global Payments, a credit card payments processor, was compromised, and the credit card information of 1.5 million customers was stolen, costing Global Payments $94 […]

Six Recommendations for Maintaining PCI Compliance with 3.2

Read the financial news on any given morning and you’ll find a story about a data breach costing a TK organization millions. Some companies don’t take […]

Security Basics 101

Remember the basics – Be cautious about what you post and who you befriend on social media. A new “friend” may not be a friend at […]

June 10, 2019

My new blog heading

My blog content If you want to add the picture here, click on the above ‘Add Media’ button  
May 20, 2019

IT Audit Services

In today’s information-driven business environment, organizations must continually evaluate their ability to protect information assets. This includes not only security protocols and development processes but also […]
May 20, 2019

Policy & Procedure Development

Whether required by industry regulations or implemented as part of an overall risk management strategy, developing security policies, standards and procedures is an essential part of […]
May 20, 2019

Vendor Risk Management

Enhance Vendor Risk Management with Regents & Park Vendor risk management is an essential part of enterprise security today. More than half of all security breaches […]
May 20, 2019

CCPA

Five key requirements for the California Consumer Privacy Act Requirement violations include penalty thresholds that may expose large California-based businesses to substantial risk. Both organizations with […]
May 14, 2019

SSAE18 – SOC II

Information security is a reason for concern for all organizations, including those that outsource key business operation to third-party vendors (e.g., SaaS, cloud-computing providers). Rightfully so, […]
May 14, 2019

PCI-DSS

PCI Planning, Readiness & Compliance Any Organization that collects or processes payment card information must comply with the Payment Card Industry Data Security Standard (PCI DSS).  […]
May 14, 2019

vCISO