Skip to main content

October 16, 2018

The Payment Transformation

It’s important to understand the perspective of both the business and the security leader. Merchants invest heavily in PCI compliance and it’s money w...

See Details

October 09, 2018

Caught Between a ROC and a Hard Place

It’s important to understand the perspective of both the business and the security leader. Merchants invest heavily in PCI compliance and it’s money w...

See Details

October 04, 2018

Inside and Outside the Cardholder Data Environment

Businesses have spent an enormous amount of money on PCI compliance. It is time to leverage these existing investments and expand them to include paym...

See Details

September 26, 2018

Data is the New Currency

In today’s digital world, data is currency. Nowhere does this phenomenon show itself more clearly than in the world of payment transactions. Payment f...

See Details

March 08, 2018

Part 2: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks

In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security strate...

See Details

February 28, 2018

Part 1: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks

During hundreds of strategy, risk and compliance engagements, Optiv’s consultants often have been asked very thoughtful and deep questions about contr...

See Details

February 26, 2018

The GDPR 90-Day Countdown is on! (No Need to Freak Out)

May 25, 2018 is a day that many organizations have (or should have) marked on their calendars as a game-changing moment for their business. That’s the...

See Details

December 07, 2017

Want to be a Great Security Leader? You Need a Great Lawyer

Information security continues to evolve as a profession, and this is certainly evident in the role that legislation, privacy, third-party risk and in...

See Details

November 07, 2017

GDPR Part 3: GDPR and the Information Security Program

In this third and final part of the series, we’ll spend some time bringing GDPR and its various requirements back into the information security progra...

See Details