Over the last few weeks, our team of Qualified Security Assessor's (QSAs) has been responding to questions from our clients about to how they can maintain PCI compliance while transitioning their contact centers (and associated business processes) to “work from home.” It's not just an important topic, but a very valid one given that most organizations today have never dealt with these kind of business challenges before; they truly are unprecedented. In many cases, just keeping the business operating is paramount and we recognize how many variables are at play today.Read More
Security, NetworkSecurity, PCI, Cybersecurity, Information Security, compliance, PCIDSS4.0, PCI Community, Payment Card Industry, cardholder data, sensitive authentication data, CHD, SAD, Natural Language Processing Solutions, NLP
As technology continues to advance, it's critical for the security community to respond to the evolving risk for consumer data.
On Tuesday, January 14, I had the opportunity to once again sit the PCI Dream Team’s eighth online session. During this session, we responded to questions from our participants which covered a broad range of concerns.Read More
IT, Information Technology, Online Business Systems, Online Business Systems Winnipeg, compliance, Digital Business transformation, Post Secondary, Higher Learning, University of Manitoba, University of Winnipeg, University of Washington, OpalQM, Program Management
In less than a week, one of Canada’s largest information technology conferences will take place in Winnipeg.
“CANHEIT is the largest gathering of Canadian higher education IT leaders from universities, colleges, technical institutes and advanced research computing (ARC) experts. It will offer a unique forum to explore the latest best practices, opportunities and challenges within the realm of higher education technology.”
Your personal health data is not only very private, but it is very valuable. Healthcare organizations across North America (and the world) are continually needing to invest in security programs that protect their patient information through physical security, technology, and managing human-led processes and workflows.Read More