No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Compliance

PCI DSS Compliance Should not Be a Check-the-Box Fire Drill

by Steven Grossman
May 24, 2016
in Compliance
Improper PCI DSS compliance practices could leave your organization exposed to cyber risk

Let’s be honest: PCI DSS compliance is viewed as a pain in the neck.  It is seen by management in many companies as a big fire drill to check the compliance box, but without real business value.  They see the scramble to test, remediate and report to achieve compliance, but they often cannot connect it to improvements in their actual security posture.  The lack of perceived value is the result of the prevalent “compliant but not secure” mode of operation.

The fire drill typically includes the following scenario: A large company with tens or hundreds of legacy systems, some of which store its most valuable information, is tasked with complying with PCI DSS requirements and validating compliance in quarterly tests and annual audits. The systems are siloed, owned by different line-of-business and application owners, sometimes with their own IT and security experts.  Each application and associated infrastructure needs to be tested, scanned or otherwise validated to be in compliance.  To minimize potentially negative impact on business critical applications, testing and scanning needs to be coordinated and scheduled with application owners.  Results need to be communicated to those same owners and coordinated with IT administrators to apply the fix.  After the fix is finally applied, the scans and tests need to be repeated to verify the exposure no longer exists.  All of this information exchanging hands starts out in vulnerability scanning and governance, risk management and compliance tools, but most often ends up in spreadsheets and emails.  Multiply those spreadsheets and emails by the number of components and stakeholders, and it is easy to see why the process overtakes the intended objective of cardholder data protection.

Meeting compliance requirements only on a quarterly and annual basis is like a CFO only reviewing and communicating financial numbers when formal reporting is required.  In reality, CFOs watch their numbers carefully every day and communicate department-specific numbers to business managers so they can manage their piece of the corporate pie.  As a result, when quarterly and annual financial reporting is required, it is a simple task to compile the data because it’s managed closely every day by every level of the organization.

A lot of ink has been spilled during the last decade talking about the concept of continuous compliance.  Taking a step back, it’s really about continuous protection, which – if done well – results in seamless compliance.  However, continuous compliance is easier said than done because, as described in the scenario above, it requires a tremendous amount of effort coordinating, assessing, remediating and reporting across potentially tens or hundreds of stakeholders.  It involves a dance between the security team that’s concerned about vulnerability management, business owners who are concerned about their application’s performance and stability and IT administrators who are tasked with patching and fixing.  Everybody is doing their best to get the job done, but the underlying focus ends up being satisfying auditors versus achieving a secure environment.

The best way to ensure that PCI DSS compliance is not a fire drill is to bake its requirements into your businesses’ daily processes and automate data collection and reporting.  Specific cyber risk information should be put into each stakeholder’s hands (such as line-of-business application owners who govern businesses most valuable assets) to enable them to take prioritized action to minimize cyber risk while fulfilling PCI requirements related to the information they govern. They can then also be held accountable by senior management for monitoring their applications and data, doing their part to protect the organization.

For example, if the PCI DSS requires businesses to implement two-factor authentication, business stakeholders and IT administrators should be provided an automated view on a daily basis into which applications have two-factor authentication implemented, the percentage of users using it, required password resets and other related information so that they know what they need to do to fulfill the requirement by the stated deadline.  As a result, when it comes time to report compliance, it is just a push of a button based on the information they have at their fingertips every day.

Achieving PCI DSS compliance does not need to be a fire drill. If businesses treat it as an enabling force to guide the protection of valuable information on a daily basis, they will not need to scramble at the last minute. Compliance will be baked in.


Tags: DOJ pilot program
Previous Post

Reading the Tea Leaves: Expansion and Interpretations of PRC Anti-Corruption Legislation

Next Post

Opimas – Running Enterprise Risk Management as a Business

Steven Grossman

Steven Grossman

Steven GrossmanSteven Grossman is Vice President of Program Management at Bay Dynamics.  Steven has more than 20 years of management consulting and industry experience working with technology, security and business executives. At Bay Dynamics, Steven is responsible for ensuring businesses are successful in achieving their security and risk management goals.  Prior to Bay Dynamics, Steven held senior positions at top-tier consultancies such as PwC and EMC, where he architected and managed programs focused on security, risk, business intelligence/big data analytics, enterprise Program Management Offices, corporate legal operations, data privacy, cloud architecture and business continuity planning for global clients in the financial services and health care industries. Steven holds a B.A. in Economics and Computer Science from Queens College and has achieved his CISSP certification.

Related Posts

Clarity on Sanctions Compliance: Examining OFAC Guidance and Enforcement

Clarity on Sanctions Compliance: Examining OFAC Guidance and Enforcement

by Steven Kuzma and Christian Cooper
March 12, 2020

With U.S. sanctions compliance fines at a decade high, organizations should be taking note of how to address emerging areas...

speech icon on blue background

CFTC Updates Reporting and Cooperation Advisory for Foreign Corrupt Practices

by William Stellmach and Robert Meyer
April 25, 2019

Early last month, the CFTC issued new advisory addressing foreign corrupt practices. Willkie Farr attorneys provide highlights and discuss implications.

department of justice building sign with American flag behind

DOJ Expands FCPA Corporate Enforcement Policy

by Michael Volkov
August 30, 2018

The Implication for Non-FCPA Related Cases Michael Volkov discusses the Justice Department’s FCPA Corporate Enforcement Policy, enacted late last year;...

view of supreme court building in Washington, DC

The Kokesh Decision

by Thomas Fox
June 9, 2017

Next Post

Opimas - Running Enterprise Risk Management as a Business

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT