Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2022

New In TrustOps: Evidence Automation with Smart Inventories

You want as much of your compliance program automated as possible, and collecting evidence to validate compliance controls always seems to take a lot of your team’s time. A considerable amount of control evidence involves providing accurate lists of artifacts to auditors — whether it’s workstations, tickets, alerts, or people. If only there were an easier way than having your teammates take screenshots and export lists from each of your internal systems.

3 Steps to Secure and Compliant Data Sharing

Every day, organizations subject themselves to audit violations and data leaks when their end-users share sensitive data with third parties – essentially anyone outside of your organization. Various regulations and compliance frameworks require sensitive data to be encrypted with industry-grade security while at rest and in transit.

How intelligent are AI tea-making robots?

When it comes to how truly intelligent Artificial Intelligence (AI) is, it’s a polarizing debate. Either AI will solve the world’s woes or robots will rule us all – Matrix-style. But it’s all a little more complicated than Hollywood makes it seem… For a deep dive, do listen to our Beyond the Data podcast hosted by Sophie Chase-Borthwick (Calligo’s Global Data & Governance Lead) and Tessa Jones (VP of Data Science Research & Development).

Meeting the 3rd-Party Risk Requirements of The NY SHIELD Act

The Stop Hacks and Improve Electronic Data Security (SHIELD) Act is designed to protect the personal data of all New York residents. This act broadens the data privacy and protection standards stipulated in the Gramm-Leach-Bliley Act (GLBA) and the New York Department of Financial Services (NYDFS). What makes this particular data protection law unique is its inclusion of biometric information, usernames, and passwords in the category of personal information.

Meeting the Third-Party Risk Requirements of the CCPA in 2022

Often regarded as the Californian version of the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) aim’s to increase consumer rights by giving California residents greater control over the use of their personal data. The CCPA heavily regulates the use of any data that could potentially link to the identity of a consumer or household, either directly or indirectly.

CCPA Compliance Vs CPRA Compliance

The California Consumer Privacy Act (CCPA) is a law that was signed on June 28, 2018, that established and promoted the consumer privacy rights and business obligations concerning the collection and sales of personal information of citizens of California. The CCPA came into effect on January 1st, 2020. Soon after in November 2020, Proposition 24, known as the California Privacy Rights Act of 2020 (CPRA) was introduced which is soon to replace the CCPA Compliance.

Interview With CMMC Provisional Assessor, Tony Giles

For our latest specialist interview in our series speaking to security leaders from around the world, we’ve welcomed Tony Giles, Lead Auditor and CMMC Provisional Assessor with the NSF. Tony has conducted audits globally for over 10 years and worked on large-scale security implementation projects, including NIST 800-171, NIST 800-88 and ISO/IEC 27001, ISO 28000.

HIPAA for Dummies: The Ultimate HIPAA Security and Compliance FAQ

Building a HIPAA-compliant security program is a very time intensive and demanding undertaking. It can also be confusing, as satisfying requirements like the HIPAA Security Rule require extensive interpretation and documentation on the part of security professionals. However, by arming yourself with knowledge before beginning the process, you can cut down on unnecessary difficulties.

Cybersecurity compliance: Time to clean up the cobwebs

Cybersecurity compliance became prominent in the last decade. From being a trivial part of an organization’s business strategy in the early years to being a core objective now, cybersecurity compliance has come a long way. Today, organizations have dedicated teams and personnel, such as chief compliance officers, to ensure that they stay compliant with the relevant standards pertaining to their industry and location. It is essential for organizations to stay updated to avoid sanctions.

Special Category Data GDPR (General Data Protection Act)

The General Data Protection Regulation is a data privacy law that protects the privacy of people of citizens of the EU and UK. The regulation is designed to protect the rights of individuals and also ensure the privacy of their personal data. The regulation outlines a detailed set of requirements for organizations collecting, storing, and managing personal data.

New Integrations: Buildkite, BitBucket, Freshteam, and JumpCloud

Since working on a spreadsheet, you and your team have come a long way. You’re enjoying the ease of working in TrustOps because it automates control mapping, test creation, and evidence workflows. However, you’re looking for ways to save a bit more time, so you can focus on your day job and growing list of priorities. Collecting evidence to validate compliance controls takes time and affects HR, IT, DevOps, and the rest of your team’s productivity.

Key Steps to implementing ISO 27001

As the leading international standard on information security management, ISO 27001 is an important certification for businesses and is increasingly being demanded by customers as part of their supply chain management. With its standardised processes and reputational status, ISO 27001 shows interested third parties and prospective clients that you take the confidentiality, integrity and availability of their data seriously.

PCI DSS Requirement 1: Summary of Changes from Version 3.2.1 to 4.0 Explained

With the launch of the new PCI DSS 4.0 version, people are still trying to get a grip on the changes introduced and the requirements improvised in the latest version. So, explaining the changes in detail VISTA InfoSec is publishing a series of expert videos explaining each of the requirements of PCI DSS in detail. So, check out the first video that talks about Requirement 1 of the PCI DSS 4.0 version, explaining the updates in detail.#pcidss #pcidss4.0

#BigPictureCyber Town Hall With Malcolm Harkins, Epiphany Systems | 7/14/22 | NeoSystems

NeoSystems #BigPictureCyber Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly #BigPictureCyber Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, cybersecurity news, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

Kintent Announces Support for ISO 9001

Becoming ISO 9001 compliant can be difficult. It requires those who are seeking it to be open to change, and to be able to commit to their new Quality Management System (QMS) processes and controls. Additionally, having to continuously stay compliant with the QMS can add a lot of pressure. But… the payoff is worth it.

ICYMI: How to Ensure Continuous Data Security & Compliance across your SaaS Apps

We recently hosted a live discussion covering emerging trends within the cloud security space, primarily reflecting on how organizations could adopt a posture of continuous security and compliance across their SaaS applications. Continue on below to view the highlights from this discussion.

Connect Kintent's Trust Cloud to Your CRM

Keeping your sales and security teams in sync on the progress of security questionnaires can be painful. Frustration due to lack of transparency can occur, which tends to add friction to the sales process. This is because answering a security questionnaire and going through security reviews is a team sport, and sales people always want to know the latest status.

SOC for Cybersecurity- Everything You Should be knowing

Cybersecurity has always been a major concern for most businesses. With the growing incidents of data breaches, it is now imperative for businesses to invest their resource in securing their IT infrastructure and data. Moreover, after the COVID-19 scenario, there was an unprecedented spike in the need for remote working. This totally hampered the security measures implemented by the organization’s IT and Cybersecurity teams.

NeoSystems & Deltek Join Forces to Deliver Services in the Cloud

RESTON, Va., July 12, 2022 – NeoSystems, a full-service strategic outsourcer, IT systems integrator and managed services provider to the government contracting market, is once again joining forces with Deltek, the leading global provider of software and solutions for project-based businesses.

PCI Sensitive Authentication Data Requirements - What you should know?

The PCI Council aims at minimizing the risk of cardholder data by securing sensitive cardholder data including Sensitive Authentication Data (SAD). For these reasons, PCI DSS Standards are strictly enforced in the payment card industry. According to the PCI DSS Security Standard Requirement, organizations dealing with sensitive card data are required to maintain maximum security and implement measures that ensure the confidentiality, privacy, and security of the cardholder data.

SOC2 Readiness Assessment - What Should You Know

A Readiness Assessment in general is an evaluation process that suggests whether or not an organization is compliant with a specific standard/regulation. The assessment helps determine gaps in security controls and demonstrates the effectiveness of controls to achieve compliance. The assessment works as a guide to identify and address the potential gaps in controls. The readiness assessment basically works as a test run for organizations looking to achieve compliance.

CMMC 2 0 Compliance Understanding the Requirements

The new updated CMMC 2.0 version was released to improve the security standard and address the growing cyber risks in the industry. The latest version is updated in a way that the CMMC compliance evaluates the cyber security practices and processes, and certifies a contractor based on their ability to protect the Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) within the supply chain system. Explaining in detail the new additions and changes introduced in CMMC 2.0 Compliance, VISTA InfoSec conducted an informative webinar on “CMMC 2.0 Compliance Understanding the Requirements”.

The Guide to Kubernetes Compliance

Kubernetes (K8s) has achieved undeniable mainstream status, with 96% of organizations currently evaluating or already using this technology, according to the Cloud Native Computing Foundation (CNCF). This popularity also brings growing scrutiny over Kubernetes compliance standards and audits, in light of how Kubernetes and cloud native technologies demand a very different approach to security.

Why CISOs Need to Care about Compliance Regulation in Cybersecurity

Compliance regulation is a necessary evil in the world of cybersecurity. As a CISO, you need to be aware of all compliance regulations that affect your organization so that you can ensure your security program meets these requirements while also protecting sensitive data.

HIPAA Compliance: 5 Healthcare Cyber Security Vulnerabilities

The world of healthcare has gone digital. Records can now be transferred anywhere they are needed, from hospital to hospital, or even directly to the patient’s email inbox. While the digitalization of healthcare records is extremely convenient but it is now equally dangerous. These sensitive PHI data are exposed to various forms of cyber threats and vulnerabilities.

Interview With CMMC Practitioner, Rhia Dancel

For the next installment in our series of interviews asking leading security and compliance specialists about their achievements in their field, we’ve welcomed Rhia Dancel, Lead Auditor and CMMC Registered Practitioner with the NSF. Rhia Dancel is an ISO/IEC 27001 and 9001 Lead Auditor for NSF-ISR as well as a CMMC Registered Practitioner and has previously held several auditing and technical positions in information security and pharma quality sectors.