A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Leveraging Risk Strategy to Move Beyond Check-Box PCI Compliance Breadcrumb Home Insights Blog Leveraging Risk Strategy to Move Beyond Check-Box PCI Compliance October 29, 2018 Leveraging Risk Strategy to Move Beyond Check-Box PCI Compliance Merchants often put compliance spending at the top of their list for budgeting purposes because the consequences of non-compliance can be expensive. Fear of increased processing fees from acquiring banks, penalties from credit card companies and the risk of brand and reputational damages can be quite compelling. However, compliance does not always equal security. Merchants can be 100 percent complaint and still be breached. The time has come to think beyond the Payment Card Industry (PCI) requirements and embrace a unique, holistic Secure Payment approach. Leveraging existing PCI compliance foundations and technology investments, while incorporating leading cyber security best practices, enables merchants to secure their entire payment lifecycle. The increasing popularity of simplified payment methods, such as PayPal, Apple Pay and Venmo, amplifies the importance of data privacy and the need to protect an organization – in addition to its customers. The attack surface continues to expand with the explosive growth of Point of Sale (POS) types and related applications creating more end points on-premises and in the cloud. As applications move to the cloud, exposure spreads – requiring different security techniques. Time for change. Merchants have a decision to make. Continue to invest budgets and resources in PCI compliance, leaving parts of the business vulnerable, or shift the paradigm and leverage those investments to secure the entire payment lifecycle. Continuing to add to existing technology debt is not sustainable in the long run. However, merchants need to evolve with new POS endpoints, launch new applications, expand loyalty programs and pursue digital transformation – all while protecting data and meeting compliance requirements. Transitioning to a focus on securing the entire payment lifecycle with risk-based decision making, rather than maintaining a laser focus on PCI compliance requirements and check-box compliance, can help merchants reduce priority juggling and optimize compliance spending. PCI compliance will become an intrinsic outcome of security instead of a separately funded and managed function. Tighter alignment of security and compliance means merchants can: Protect cardholder data at rest and in motion Identify, assess, qualify and manage risk in a prioritized manner Secure applications across the payment lifecycle Achieve security and compliance agility It’s time for merchants to consider risk beyond PCI requirements. A successful and comprehensive risk strategy considers risk inside and outside the cardholder data environment (CDE). Learn how to achieve a holistic payment security program by reading our white paper. By: Bryan Wiese Vice President, Identity and Access Management Bryan Wiese brings more than a decade of experience in the identity and access management (IAM) space to his position as vice president of IAM for Optiv. In this role, he is responsible for the company’s IAM services delivery and growth strategy while helping drive strategic IAM customer growth, next-generation services development and cross-security practice alignment. Share: PCI Compliance Risk
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?