Uncategorized

Path to Becoming a CISO and the Role of the CISO on the Board

 

The importance of cybersecurity leadership has increased significantly as organizations face more advanced and persistent cyber threats. Chief Information Security Officers (CISOs) have become essential in protecting an organization’s digital assets and reputation. This blog post will offer a detailed roadmap for aspiring CISOs, outlining the educational and professional steps needed to achieve this key role and exploring the changing responsibilities of the CISO within the boardroom.

Who Is a CISO?

A Chief Information Security Officer (CISO) is the executive responsible for an organization’s information and data security. This role includes a wide range of responsibilities, such as:

  • Developing and implementing cybersecurity strategies: Ensuring the organization has a robust security posture.
  • Managing cybersecurity teams and initiatives: Leading teams to execute security measures effectively.
  • Ensuring compliance with regulations: Overseeing adherence to legal and industry standards.
  • Communicating risks to stakeholders: Presenting cybersecurity risks and strategies to executives and the board.

Path to Becoming a CISO

1. Educational Background

Having a strong background in computer science, information technology, or cybersecurity is essential for future CISOs. Many successful CISOs have advanced degrees like an MBA or a Master’s in Cybersecurity, which can greatly improve their career opportunities.

2. Certifications

Certifications play a vital role in establishing credibility and expertise. Key certifications include:

  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified Chief Information Security Officer (C|CISO)
  • Other relevant certifications include Certified Ethical Hacker (CEH) and CompTIA Security+.

3. Building Technical Expertise

Hands-on experience with cybersecurity tools and technologies is crucial. Aspiring CISOs should concentrate on understanding areas such as risk management, incident response, cloud security, and data protection, which are vital to effective security leadership.

4. Gaining Leadership Experience

Moving from technical roles to leadership positions is crucial on the path to becoming a CISO. Gaining experience as a Security Manager or Security Architect helps build vital skills in team management, communication, and strategic planning.

5. Networking and Mentorship

Leveraging professional networks and cybersecurity communities can offer valuable insights and opportunities. Finding mentors who can provide guidance and share their experiences can be key in navigating the path to becoming a CISO.

6. Staying Updated

The cybersecurity landscape constantly evolves. Aspiring CISOs must stay informed about emerging threats and solutions through ongoing learning, attending conferences and workshops, and reading industry publications.

The Evolving Role of the CISO

1. From IT Manager to Business Leader

The CISO role has evolved from a solely technical position to a role focused on strategic leadership. Nowadays, CISOs are recognized as essential contributors to business success, shaping organizational strategy and decision-making.

2. Understanding Business Objectives

CISOs need to align cybersecurity strategies with overall organizational goals. This involves balancing technical skills with a solid understanding of business needs to make sure security measures support growth and innovation.

3. Risk Management and Compliance

A key part of the CISO’s role is to identify, assess, and reduce risks. Making sure to follow regulations like GDPR and CCPA is crucial for maintaining both security and trust.

The Role of the CISO on the Board

1. Why CISOs Are Joining the Boardroom

As cybersecurity becomes a key part of business operations, the need for CISOs in the boardroom has grown. Their expertise is crucial for helping organizations navigate the complexities of digital security.

2. Communicating Cybersecurity Risks to the Board

CISOs need to clearly communicate cybersecurity risks in a way that non-technical board members can understand. Framing these risks as business risks is essential for securing board support and resources.

3. Influencing Strategic Decisions

CISOs play a crucial role in guiding decisions about digital transformation, security investments, and risk management. Their insights can greatly influence the organization’s strategic direction.

4. Building Cybersecurity Awareness Among Board Members

Educating board members on the importance of proactive cybersecurity measures promotes a security-focused culture across the organization. CISOs champion security as a collective responsibility.

5. Balancing Cybersecurity with Business Growth

CISOs help boards understand that cybersecurity is not just about protection but also a driver of business continuity and innovation. They ensure that security protocols do not hinder growth.

Challenges Faced by CISOs

1. Keeping Up with Evolving Threats

The ever-changing landscape of cyber threats constantly challenges CISOs. Staying ahead of advanced attacks demands continuous vigilance and flexibility.

2. Bridging the Gap Between IT and Business

Overcoming the view of cybersecurity as a cost center is crucial for CISOs. They need to clearly communicate the benefits of security investments to secure stakeholder support.

3. Managing Stress and Burnout

The high-pressure nature of the CISO role can cause stress and burnout. Balancing daily operations with long-term strategy is essential for personal well-being.

4. Gaining Board-Level Trust

Building credibility and trust with board members is essential for CISOs. Showing tangible results and highlighting the impact of cybersecurity efforts can strengthen this trust.

Tips for Aspiring CISOs

1. Develop a Strategic Mindset

Focusing on how cybersecurity contributes to overall business strategy is crucial. Aspiring CISOs should learn to think beyond technical solutions to promote organizational success.

2. Hone Communication Skills

Mastering the skill to explain complex technical issues simply is essential. Building relationships with non-technical stakeholders improves collaboration and support.

3. Gain Cross-Functional Experience

Working with departments such as finance, legal, and operations offers a comprehensive understanding of business functions. This experience is crucial for developing effective cybersecurity strategies.

4. Seek Leadership Opportunities

Volunteering for leadership roles in cybersecurity teams shows initiative and dedication to promoting change and innovation.

The Future of the CISO Role

1. Strategic Partnerships

As cybersecurity strategies develop, CISOs will more often work with other C-suite leaders, including CIOs, CTOs, and CFOs, to align goals and implement coordinated security measures.

2. Emerging Responsibilities

The scope of the CISO role is expanding to cover areas such as data privacy, AI ethics, and supply chain security, reflecting the complex nature of today’s business environments.

3. The CISO as a Change Agent

CISOs are becoming change agents, leading cultural shifts toward a more security-aware organization. Their leadership promotes innovation while maintaining resilience against threats.

Conclusion

The path to becoming a Chief Information Security Officer is complex, requiring a mix of technical skills, leadership abilities, and business knowledge. As the role of the CISO continues to grow and change, these professionals are increasingly seen as key contributors to organizational strategy and success.

For those aiming to reach this critical position, embracing continuous learning, networking, and sharpening communication skills is essential. Doing so helps them prepare to navigate cybersecurity complexities and contribute meaningfully at the board level.

The post Path to Becoming a CISO and the Role of the CISO on the Board appeared first on .

Read More

Uncategorized

5G/6G Network Vulnerabilities and Safeguarding the Future of Connectivity

 

The rollout of 5G networks is already transforming the way the world connects, bringing faster speeds, ultra-low latency, and enhanced connectivity. As we look ahead, 6G networks promise even more groundbreaking advancements, such as immersive experiences through extended reality (XR), hyper-accurate positioning systems, and AI-driven applications at an unprecedented scale. However, it’s crucial to understand that with this new wave of connectivity comes a growing concern: vulnerabilities in 5G and 6G networks. These networks, while powerful, introduce unique security challenges that could be exploited by cybercriminals, nation-state actors, and even insider threats. This understanding is the first step in ensuring that the future of connectivity remains secure.

In this blog, we’ll explore the vulnerabilities associated with 5G and 6G networks, the risks they pose, and the measures organizations and governments can take to safeguard this critical infrastructure.

The Promise of 5G and 6G Networks

1. What Makes 5G Revolutionary?

5G networks deliver faster data speeds, lower latency, and increased capacity to support billions of connected devices. This has paved the way for applications such as:

  • Smart cities: Enabling IoT-powered infrastructure for traffic management, energy efficiency, and public safety.
  • Autonomous vehicles: Supporting real-time data exchange for safer and more efficient transportation.
  • Remote healthcare: Facilitating telemedicine, remote surgeries, and AI-driven diagnostics.

2. The Vision for 6G

While 5G is still being deployed worldwide, research on 6G networks is underway. Expected to arrive around 2030, 6G aims to provide:

  • Terahertz (THz) frequency communication for even faster speeds and larger bandwidth.
  • AI-native networking for self-optimizing networks.
  • Holographic communications and fully immersive virtual experiences.

However, the complexity of these next-generation networks introduces new attack surfaces that require immediate attention.

Key Vulnerabilities in 5G/6G Networks

1. Increased Attack Surface

The massive scale of device connectivity in 5G and 6G networks creates an expanded attack surface. Billions of IoT devices, sensors, and edge computing nodes connect to these networks, making it harder to monitor and secure every endpoint.

2. Supply Chain Risks

5G/6G networks rely on a global supply chain for hardware and software components. Attackers can exploit vulnerabilities in third-party equipment or software to compromise entire networks. Examples include backdoors in telecom hardware and malicious updates.

3. Software-Defined Networking (SDN) and Virtualization Risks

5G networks rely heavily on virtualization and software-defined networking (SDN) to enable flexibility and scalability. While these technologies improve efficiency, they also introduce risks:

  • Misconfigurations in SDN controllers can leave networks vulnerable to various types of attacks.
  • Virtualized network functions (VNFs) may lack proper isolation, allowing attackers to move laterally across systems.

4. Signaling Protocol Vulnerabilities

Protocols such as Diameter and SS7, which are used for signaling in mobile networks, are known to have security flaws. These vulnerabilities can be exploited for eavesdropping, intercepting messages, and even impersonating users.

5. Lack of Encryption in Edge Devices

Edge computing, a key component of 5G and 6G networks, processes data closer to end-users, thereby reducing latency. However, many edge devices lack robust encryption mechanisms, making them susceptible to data breaches and tampering.

6. Threats from AI-Powered Cyberattacks

As 6G networks integrate AI capabilities, attackers may also use AI to launch more sophisticated and adaptive cyberattacks. For instance, AI could be used to exploit vulnerabilities in real-time or automate large-scale DDoS attacks.

Risks Posed by 5G/6G Network Vulnerabilities

1. Cyber Espionage

Unsecured 5G and 6G networks could be exploited by nation-state actors for cyber espionage, targeting sensitive government, military, and corporate data.

2. Disruption of Critical Infrastructure

As 5G/6G networks become the backbone of smart cities and industrial systems, any disruption—whether through cyberattacks or natural disasters—could have catastrophic consequences on public safety, energy grids, and transportation systems.

3. Data Privacy Violations

The vast amount of data generated and transmitted by connected devices in 5 G and 6 G environments increases the risk of data breaches. Attackers could target personal, financial, or health-related information, undermining user trust.

4. Economic and Reputational Damage

Successful attacks on communication networks can result in significant financial losses for businesses and damage to their reputations. Downtime caused by network disruptions can also erode customer confidence.

Safeguarding the Future of Connectivity: Best Practices

1. Secure Network Architecture

  • Zero Trust Architecture (ZTA): Apply the principle of “never trust, always verify” to all network interactions, ensuring that every device and user is authenticated and authorized.
  • Network Slicing Security: Protect virtual network slices used for specific applications by implementing strong isolation mechanisms.

2. Strengthen Supply Chain Security

  • Conduct thorough assessments of third-party vendors and suppliers to ensure they meet stringent security standards.
  • Implement a Software Bill of Materials (SBOM) to track all components used in the network infrastructure.

3. Enhance Protocol Security

  • Replace outdated protocols, such as SS7, with more secure alternatives.
  • Use end-to-end encryption for all communication channels to prevent eavesdropping and data interception.

4. Implement AI-Driven Threat Detection

  • Leverage AI and machine learning to monitor network traffic for anomalies and detect potential threats in real time.
  • Use AI to predict and mitigate risks before they impact the network.

5. Secure Edge Computing

  • Encrypt data at rest and in transit on edge devices to prevent unauthorized access.
  • Regularly update and patch edge devices to address known vulnerabilities.

6. Conduct Penetration Testing and Audits

  • Perform regular penetration testing to identify and address vulnerabilities in the network infrastructure.
  • Conduct security audits to ensure compliance with industry standards and regulations.

7. Build Cyber Resilience

  • Develop a robust incident response plan to minimize the impact of cyberattacks and mitigate potential risks.
  • Invest in backup and recovery solutions to ensure business continuity in the event of a network disruption.

The Role of Governments and Industry in Securing 5G/6G Networks

Securing 5G/6G networks is not solely the responsibility of organizations; it requires collaboration between governments, telecom operators, and technology providers. Key steps include:

  • Developing Global Security Standards: Establish unified security standards for 5G/6G networks to ensure consistency and interoperability.
  • Encouraging Public-Private Partnerships: Foster collaboration between governments and private companies to share threat intelligence and best practices.
  • Investing in R&D: Support research into advanced security technologies, such as quantum-resistant encryption, to future-proof networks.

Conclusion

The rapid evolution of 5G and 6G networks is unlocking new opportunities for businesses and individuals, but it also introduces unprecedented security challenges. As we move toward a hyperconnected future, it’s essential to address these vulnerabilities head-on. This can be achieved by adopting proactive security measures, such as those outlined in this blog, and fostering collaboration across industries. Only by working together and taking proactive steps can we ensure the security of our future networks.

The future of connectivity depends on our ability to safeguard these networks from emerging threats. By staying vigilant and investing in security today, we can ensure that 5G and 6G networks empower innovation without compromising safety and trust.

The post 5G/6G Network Vulnerabilities and Safeguarding the Future of Connectivity appeared first on .

Read More

Uncategorized

Strengthening E-Commerce Security: A Streamlined Guide to PCI DSS Requirements 6.4.3 and 11.6.1

 

Source: PCI Security Standards Council, “Guidance for PCI DSS Requirements 6.4.3 and 11.6.1,” Version 1.0, March 2025.

Purpose: To provide supplemental information and guidance to merchants and third-party service providers (TPSPs) on meeting PCI DSS Requirements 6.4.3 and 11.6.1, which address the growing threat of e-skimming attacks on e-commerce payment pages. This document does not replace or supersede requirements in any PCI SSC Standard.

As e-commerce continues to grow, so does the threat of cyberattacks targeting payment systems. One of the most alarming risks today is e-skimming, where cybercriminals exploit scripts running on payment pages to steal sensitive payment card data. To combat this, the Payment Card Industry Data Security Standard (PCI DSS) introduced Requirements 6.4.3 and 11.6.1 in its latest version (v4.x). These requirements focus on managing and monitoring payment page scripts and security-impacting HTTP headers to prevent e-skimming attacks.

This blog proactively breaks down the guidance provided by the PCI Security Standards Council (PCI SSC) into a clear, actionable overview to help merchants, third-party service providers (TPSPs), and stakeholders enhance their payment page security.

The Urgent Need to Address the Growing Threat of E-Skimming in E-Commerce

E-skimming attacks, also referred to as Magecart or formjacking attacks, exploit vulnerabilities in e-commerce systems. These attacks, which can have severe consequences, target scripts running on payment pages, either through supply-chain compromises (e.g., third-party scripts like analytics or chatbots) or direct script injection into merchant environments.

E-skimming attacks fall into two main categories:

  • Silent Skimming: Malicious scripts steal data in the background without disrupting the transaction.
  • Double-Entry Skimming: Fake payment forms trick customers into entering their card details twice—once in the attacker’s form and again in the legitimate one.

With the increasing reliance on external scripts for e-commerce functionality, the need for robust script management and monitoring has never been greater.

Understanding PCI DSS Requirements 6.4.3 and 11.6.1

These two requirements specifically address the risks of compromised scripts and tampered HTTP headers on payment pages. Here’s what they entail:

Requirement 6.4.3: Managing Payment Page Scripts

This requirement focuses on authorizing, monitoring, and justifying the scripts allowed on payment pages. To comply, businesses must:

  • Authorize: Every script running on payment pages must be reviewed and approved before use.
  • Integrity-Check: Mechanisms like hashing or Sub-Resource Integrity (SRI) must confirm that scripts have not been tampered with.
  • Inventory and Justify: Maintain a detailed record of all scripts, including technical or business justifications for their use.

For example, if a merchant uses a third-party 3DS (3D Secure) solution, 3DS-related scripts are exempt from this requirement due to the trust relationship established during onboarding. However, any other scripts outside of the 3DS scope must adhere to Requirement 6.4.3.

Requirement 11.6.1: Tamper-Detection and Monitoring

This requirement ensures scripts and security-impacting HTTP headers are monitored for unauthorized changes. Businesses must:

  • Deploy a tamper-detection mechanism to monitor scripts and HTTP headers on payment pages.
  • Generate alerts for any unauthorized changes, such as script modifications or header tampering.
  • Conduct monitoring at least weekly or more frequently based on a risk analysis.

These mechanisms prevent attackers from injecting malicious scripts or altering security headers like Content Security Policy (CSP)X-Frame Options, or Strict Transport Security (HSTS), which are critical for safeguarding payment pages.

Who Is Responsible?

The responsibility for complying with these requirements depends on the payment page setup. Here’s a summary of the most common scenarios:

  1. Merchant-Hosted Payment Forms: The merchant is responsible for all scripts and headers on the payment page.
  2. Embedded Payment Forms (Iframes): The merchant is responsible for scripts on the parent webpage, while the TPSP is responsible for scripts within the iframe.
  3. Redirected Payment Pages: If consumers are redirected to a TPSP-hosted payment page, the merchant’s responsibility is limited, and the TPSP handles compliance.
  4. Fully Outsourced Websites: TPSPs manage all aspects of script and header security, while the merchant is not directly responsible.

How to Comply with PCI DSS Requirements 6.4.3 and 11.6.1

Achieving compliance requires implementing processes, tools, and controls to secure payment page scripts and headers. Here’s a step-by-step guide:

1. Managing and Securing Scripts (Requirement 6.4.3)

  • Authorize Scripts: Implement a formal approval process to review scripts before deployment.
  • Verify Integrity: Use tools like:
    • Content Security Policy (CSP): Restrict where scripts can be loaded from.
    • Sub-Resource Integrity (SRI): Compare cryptographic hash values to ensure scripts remain unaltered.
  • Maintain a Script Inventory: Document every script, its purpose, and justification. Automated tools can help streamline this process for larger setups.

2. Monitoring and Detecting Tampering (Requirement 11.6.1)

  • Deploy a Monitoring Mechanism: Use tools such as webpage monitoring solutions or proxy-based systems to detect unauthorized changes in real time.
  • Generate Alerts: Ensure the monitoring system triggers alerts for any suspicious changes to scripts or HTTP headers.
  • Incident Response Plan: Integrate alerts into your incident response process to address breaches promptly.

Best Practices to Minimize Risk

The PCI SSC provides additional recommendations to help businesses reduce e-skimming risks:

  • Minimize Scripts: Only include essential scripts in payment pages.
  • Isolate Scripts in Sandboxed Iframes: Prevent scripts from accessing sensitive data by isolating them.
  • Restrict Script Sources: Use CSP to limit the domains from which scripts can load.
  • Monitor Behavior: Regularly analyze script behavior for anomalies, such as unauthorized access to payment fields.
  • Regular Technical Assessments: Conduct penetration tests and vulnerability scans to identify security gaps.

Leveraging Third-Party Service Providers (TPSPs)

TPSPs can assist merchants in meeting these requirements by:

  • Hosting secure payment pages on their servers.
  • Providing Software Development Kits (SDKs) with built-in protections against tampering.
  • Offering real-time monitoring services to detect e-skimming attempts.

Merchants should review their TPSP’s Attestation of Compliance (AOC) to ensure alignment with PCI DSS requirements.

Demonstrating Compliance

To prepare for PCI DSS assessments, businesses must maintain thorough documentation, including:

  • Policies and procedures for script management.
  • A detailed script inventory with justifications.
  • Evidence of monitoring activities, such as logs and reports.
  • Incident response plans for handling alerts from tamper-detection systems.

Conclusion

Non-compliance with these requirements can lead to severe consequences, including financial penalties and reputational damage. PCI DSS Requirements 6.4.3 and 11.6.1 provide a robust framework for securing e-commerce payment pages against the ever-growing threat of e-skimming. By managing and monitoring scripts and HTTP headers, merchants and service providers can protect sensitive customer data, prevent costly breaches, and maintain compliance with industry standards.

Implementing these requirements is critical to safeguarding your e-commerce environment, whether you’re a small merchant or a large enterprise. For further guidance, refer to the official PCI DSS documentation and consult with your payment service providers to ensure your systems are secure.

Take action today to protect your customers—and your business—from the risks of e-skimming.

The post Strengthening E-Commerce Security: A Streamlined Guide to PCI DSS Requirements 6.4.3 and 11.6.1 appeared first on .

Read More

Uncategorized

Auditing Emerging Technology: Best Practices and Key Considerations

 

Emerging technologies are not just changing industries; they are transforming them at a rapid pace, presenting both incredible opportunities and significant risks. From AI-driven innovations to blockchain systems, these advancements demand scrutiny through audits to ensure they comply with regulations, remain secure, and align with ethical standards.

In today’s fast-paced world, auditing emerging technology is not just important; it’s a necessity for mitigating risks and ensuring accountability. This article will guide you through the importance of auditing new technologieskey areas to focus on, and best practices to adopt. Whether you’re an IT professional, auditor, or tech enthusiast, mastering this process is critical to staying ahead in our tech-driven future.

What Is Auditing in the Context of Emerging Technology?

Auditing, in the context of emerging technology, refers to the systematic evaluation of new technological systems, processes, and their implications. Unlike traditional IT audits, which often focus on existing infrastructure and compliance, audits for emerging technologies involve assessing innovative applications and their associated potential risks and benefits.

Key Points:

  • Definition: Auditing emerging technology involves evaluating new systems for compliance, security, and ethical implications.
  • Importance: As technology evolves, so do the risks associated with it, making audits crucial for organizations.
  • Difference: Traditional IT audits focus on established systems, while emerging tech audits assess innovative solutions and their impacts.

Why Auditing Emerging Technology Is Essential

Auditing emerging technology is vital for several reasons:

  • Regulatory Compliance: As regulations surrounding technology evolve, organizations must ensure that their innovations comply with local and global standards, such as GDPR for data protection. Auditing emerging technology plays a crucial role in this compliance.
  • Cybersecurity Risks: New technologies often introduce unforeseen vulnerabilities. Regular audits play a proactive role in identifying and mitigating these risks before they lead to breaches, making them a crucial part of cybersecurity management.
  • Ethical Considerations: With the rise of AI, concerns about bias and transparency are growing. Auditing ensures that ethical standards are met during the deployment of technology.
  • Operational Continuity: Auditing enables organizations to assess the scalability and reliability of new technologies, ensuring they integrate seamlessly with existing systems.

Key Areas to Audit in Emerging Technology

When conducting audits on emerging technology, focus on the following areas:

  • Data Privacy and Security: Assess how sensitive data is handled and ensure compliance with privacy laws, such as GDPR and CCPA.
  • AI and Machine Learning Models: Evaluate algorithms for bias and fairness, and ensure they are explainable to stakeholders.
  • Blockchain Systems: Audit smart contracts for vulnerabilities and verify data integrity across decentralized networks.
  • IoT Devices: Review the security of devices and their ability to receive updates and patches.
  • Cloud and Edge Computing: Evaluate data storage practices, access controls, and the shared responsibility model in cloud environments.

Challenges in Auditing Emerging Technology

While auditing is essential, it comes with its challenges:

  • Complexity of New Systems: The rapid pace of technological advancement makes it difficult to keep up with emerging systems.
  • Lack of Established Frameworks: Auditing new technologies often lacks universally accepted standards, resulting in inconsistent assessments.
  • Resource Constraints: Many organizations struggle with limited time, expertise, and tools necessary for thorough audits.
  • Interdisciplinary Knowledge Requirements: Effective audits require a blend of knowledge in technology, law, ethics, and business practices.

Best Practices for Auditing Emerging Technology

To conduct effective audits, consider these best practices:

  • Develop Clear Audit Objectives: Focus on compliance, efficiency, and risk mitigation to guide your audit process.
  • Adopt Risk-Based Auditing Approaches: Prioritize high-risk areas, such as data security and AI decision-making, for thorough assessments.
  • Leverage Specialized Tools: Utilize advanced auditing software tailored for AI, blockchain, IoT, and other emerging technologies.
  • Engage Cross-Disciplinary Experts: Collaborate with professionals from diverse backgrounds, including legal, ethical, and technical fields, to enrich your audit process.
  • Continuous Monitoring and Reporting: Implement real-time monitoring systems to identify and address issues promptly.

Tools and Frameworks for Auditing Emerging Technology

Several tools and frameworks can assist in auditing emerging technology, including:

  • NIST Cybersecurity Framework: A comprehensive approach to managing cybersecurity risks.
  • AI Auditing Standards (ISO/IEC 23894): Guidelines for evaluating AI systems.
  • COBIT for IT Governance: A framework for aligning IT goals with business objectives.

Customizing these tools to fit specific emerging technology applications will enhance the effectiveness of your audits.

The Future of Technology Audits

Looking ahead, the landscape of technology audits will continue to evolve:

  • AI-Powered Auditing Tools: AI will revolutionize the auditing process by providing enhanced data analysis and pattern recognition.
  • Increased Regulation: Expect stricter global standards around emerging technologies to ensure compliance and accountability.
  • Ethical Audits: The focus will shift towards understanding the social impact of technology and ensuring ethical practices are upheld.
  • Auditing Autonomous Systems: New challenges will arise as self-learning systems, such as autonomous vehicles, become increasingly prevalent in society.

Conclusion

Auditing emerging technology is a critical process in this fast-paced, innovation-driven world. By focusing on compliance, cybersecurity, and ethical considerations, organizations can mitigate risks while leveraging the full potential of new advancements. As technology evolves, so must our auditing practices. By adopting best practices, utilizing specialized tools, and staying informed about future trends, we can ensure that emerging technologies are not only practical but also secure, fair, and compliant with global standards.

Ready to future-proof your tech audits? Begin by evaluating your current auditing frameworks and incorporating the strategies outlined in this guide.

The post Auditing Emerging Technology: Best Practices and Key Considerations appeared first on .

Read More

Uncategorized

ASV Scans Using Cloudflare: What You Need To Know

 

Ensuring PCI DSS compliance is a crucial responsibility for any organization that handles payment card data. One of the key requirements is conducting quarterly vulnerability scans using an Approved Scanning Vendor (ASV). However, if your website is protected by Cloudflare, running a successful ASV scan requires careful planning and technical know-how. In this detailed guide, we’ll explore the unique challenges of ASV scanning with Cloudflare, outline proven strategies for success, and provide actionable tips to help you achieve accurate, compliant results.

Why ASV Scans Matter

ASV scans are a cornerstone of PCI DSS compliance. They are designed to identify vulnerabilities in all externally accessible systems within the cardholder data environment (CDE). The goal is to minimize the risk of data breaches and ensure that your organization’s security posture meets industry standards. For organizations leveraging Cloudflare for security and performance, the process of ASV scanning introduces unique technical and operational challenges that must be addressed to ensure compliance.

Understanding the Challenges of ASV Scanning with Cloudflare

Cloudflare as a Proxy

Cloudflare acts as a reverse proxy, sitting between your users and your origin server. When an ASV scan is performed on a domain protected by Cloudflare, the scan typically targets Cloudflare’s edge network rather than your actual origin server. This can result in the scan missing vulnerabilities present on your backend infrastructure, leading to a false sense of security or, conversely, to scan failures if Cloudflare blocks the scanner.

Key Point: Scanning the proxy does not equate to scanning your actual web server. PCI DSS requires that the scan cover all externally accessible systems that are part of the CDE or can affect the security of the CDE.

WAF Interference

Cloudflare’s Web Application Firewall (WAF) is designed to block malicious traffic, but it can also block or challenge legitimate traffic from ASV scanners. This interference can cause scans to fail or produce misleading results, such as false positives or negatives. Additionally, Cloudflare’s rate limiting and managed rules can further complicate the scanning process.

Load Balancer Complexities

If your infrastructure includes load balancers behind Cloudflare, the situation becomes even more complex. Load balancers distribute incoming traffic across multiple backend servers, which can obscure the true nature of your backend environment from the scanner. This can result in incomplete scan coverage or inconsistent results. 

Strategies for a Successful ASV Scan

To overcome these challenges, organizations must take deliberate steps to ensure that ASV scans are both successful and accurate.

Whitelisting ASV Scanner IP Addresses

Step 1: Identify the IP addresses used by your ASV vendor. Your ASV should provide a list of IP ranges from which their scanners operate.

Step 2: In your Cloudflare dashboard, create a custom WAF rule to allow traffic from these IP addresses. The rule should bypass Cloudflare’s security features, such as managed rules and rate limiting, for requests originating from the ASV scanner.

Example Rule:
“If incoming requests match ‘IP Source Address is in [ASV IP ranges]’, then Action is ‘Skip’ (for specific security features).”

This approach ensures that the ASV scanner can reach your origin server without being blocked or challenged by Cloudflare’s security mechanisms.

Scanning the Origin Server Directly

If your infrastructure allows, you may consider temporarily making your origin server’s direct IP address publicly accessible for the duration of the ASV scan. This bypasses Cloudflare entirely, allowing the scanner to assess your server directly.

Important Considerations:

  • This method may introduce security risks, as exposing your origin server can make it vulnerable to attacks.
  • Always consult with your ASV vendor and internal security team before implementing this approach.
  • Ensure that the exposure is strictly time-limited and monitored.

Note: This approach is not always feasible, especially for organizations with strict security policies or complex network architectures.

Ensuring Comprehensive Scan Coverage

  • Coordinate with Your ASV Vendor: Confirm that the scan covers all in-scope systems, including those behind load balancers or Cloudflare’s proxy.
  • Document Your Load Balancer Configuration: Clearly document how your load balancer distributes traffic and how this affects scan coverage. This documentation is essential for compliance and audit purposes.
  • Verify Scan Results: After the scan, work with your ASV to ensure that all relevant systems were included and that no critical assets were missed due to interference from Cloudflare or the load balancer.

Reviewing and Interpreting Scan Results

Maintain Documentation: Keep detailed records of your scan process, configurations, and communications with your ASV to ensure compliance and readiness for audits.

Carefully Review Findings: Analyze the scan results with your ASV to ensure they accurately reflect the security posture of your origin server.

Address False Positives/Negatives: Be aware that Cloudflare’s proxying and security features can sometimes result in misleading findings. Collaborate with your ASV to resolve any discrepancies.

Important Notes and Compliance Considerations

  • PCI DSS Requirements: PCI DSS mandates that all externally accessible systems within the CDE be included in quarterly ASV scans. This includes systems protected by Cloudflare.
  • Cloudflare’s WAF and Rate Limiting: While these features are essential for security, they can interfere with ASV scans. Adjust your Cloudflare configuration as needed to allow the scanner to access your origin server.
  • Responsibility and Frequency: ASV scans must be conducted at least once every three months. If you use a third-party service provider (TPSP), confirm who is responsible for the scans and ensure that your website is included.
  • Consult with Your ASV: Work closely with your ASV vendor to determine the best approach for scanning your website behind Cloudflare, ensuring full compliance with PCI DSS requirements.

Best Practices for Technical Implementation

  • Plan Ahead: Schedule scans during maintenance windows to minimize operational impact.
  • Test Your Configuration: Before running the official scan, perform a test scan to verify that your Cloudflare rules and network settings are correctly configured.
  • Monitor and Log: Enable logging on both Cloudflare and your origin server to track scan activity and troubleshoot any issues that may arise.
  • Update Regularly: Keep your Cloudflare rules, WAF settings, and documentation up to date to reflect any changes in your infrastructure or ASV requirements.

Visualizing the Process

To make these concepts more accessible, consider using the following visual elements in your blog post:

  • Infographic: A flowchart showing the path of ASV scan traffic with and without Cloudflare, highlighting where WAF and load balancers sit in the architecture.
  • Diagram: A step-by-step visual of the whitelisting process in the Cloudflare dashboard.
  • Screenshot: Example of a custom WAF rule configuration for ASV scanner IPs.
  • Checklist: A visual checklist of steps to prepare for an ASV scan behind Cloudflare.

These visuals can help demystify the process for both technical and non-technical readers, making your content more engaging and easier to understand.

Conclusion

Running an ASV scan on a website protected by Cloudflare is a nuanced process that requires careful configuration and close collaboration with your ASV vendor. By understanding the unique challenges posed by Cloudflare’s proxying, WAF, and load balancers, and by implementing strategies such as IP whitelisting and direct origin scanning, you can ensure that your scans are both successful and compliant.

Remember, PCI DSS compliance is not just about passing a scan; it’s about maintaining a robust security posture that protects your customers and your business. By following the guidelines outlined in this post and leveraging best practices for technical implementation and documentation, you can confidently navigate the complexities of ASV scanning in a Cloudflare environment.

Ready to get started?
Work with your ASV vendor, review your Cloudflare configuration, and ensure your next PCI DSS ASV scan is both accurate and hassle-free!


For more tips on cloud security and compliance, explore my other blog posts and resources, which include best practices, technical guides, and industry updates.

The post ASV Scans Using Cloudflare: What You Need To Know appeared first on .

Read More

Uncategorized

Cybersecurity on the 4th of July: Protecting Your Digital Independence

 

The 4th of July is a time for celebration, fireworks, and family gatherings. But while we’re enjoying the festivities, cybercriminals are hard at work, exploiting the holiday to launch attacks. For cybersecurity professionals and businesses, Independence Day is not just a celebration; it’s also a reminder to safeguard our digital independence.

As someone with over 30 years of experience in cybersecurity and a passion for self-improvement, I’ve seen firsthand how holidays like the 4th of July create a perfect storm for cyber threats. Reduced staffing, distracted users, and delayed response times make organizations vulnerable to attacks. Let’s explore why this happens and how you can protect yourself and your business this holiday.

Why Cyber Threats Spike on Holidays

Cybercriminals are opportunistic, and holidays like the 4th of July provide them with unique advantages:

  1. Reduced Staffing: Many IT and security teams operate with minimal staff during holidays, resulting in fewer personnel available to monitor critical systems. This creates a window of opportunity for attackers to infiltrate networks undetected.
  1. Distracted Users: Employees are often preoccupied with holiday plans, making them more susceptible to phishing scams and social engineering attacks. Holiday-themed phishing emails, such as fake fireworks sales or patriotic promotions, are common tactics.
  1. Delayed Response Times: With key personnel unavailable, incident response times are slower. This gives attackers more time to exploit vulnerabilities and extract data before they are detected.
  1. Historical Precedent: High-profile attacks, such as the Kaseya ransomware attack during the 2021 4th of July weekend, demonstrate how cybercriminals exploit holidays to maximize impact.

Lessons from History: The Kaseya Attack

The Kaseya ransomware attack is a stark reminder of the risks associated with holiday weekends. On the eve of the 4th of July in 2021, the REvil ransomware gang targeted Kaseya, a managed service provider, compromising its customers and causing widespread disruption. This attack highlighted the importance of proactive measures, such as patching vulnerabilities and monitoring for unusual activity, especially during holidays.

How to Protect Your Digital Independence

As a cybersecurity professional and leader, I believe preparation is the key to mitigating risks. Here are some actionable steps to protect your organization this 4th of July:

1. Strengthen Monitoring and Detection

  • Ensure your Security Operations Center (SOC) is fully staffed or augmented with automated tools to monitor for suspicious activity 24/7. Rapid detection and response are crucial to stopping attacks before they escalate.

2. Educate Employees

  • Conduct pre-holiday training sessions to remind employees about phishing risks and safe online practices. Please encourage them to verify the authenticity of emails and avoid clicking on suspicious links.

3. Implement Multi-Factor Authentication (MFA)

  • MFA adds an extra layer of security, making it harder for attackers to gain access even if credentials are compromised.

4. Patch and Update Systems

  • Before the holiday, ensure all systems and software are up to date with the latest security patches. Vulnerabilities in outdated systems are a common entry point for attackers.

5. Back Up Critical Data

  • Regularly back up your data and store it securely off-site. In the event of a ransomware attack, having reliable backups can minimize downtime and data loss.

6. Test Your Incident Response Plan

  • Conduct a tabletop exercise to simulate a cyberattack scenario. This will help your team practice their response and identify gaps in your plan.

7. Adopt a Zero Trust Approach

  • Implement a Zero Trust architecture to continuously verify users and devices before granting access to sensitive data. This reduces the risk of unauthorized access.

Balancing Celebration and Vigilance

As we celebrate the 4th of July, it’s important to remember that cybersecurity is a shared responsibility. Whether you’re a business leader, an IT professional, or an individual, staying vigilant can make all the difference. Cybercriminals don’t take holidays off, but with the right preparation, neither does your defense.

This Independence Day, let’s not only celebrate our nation’s freedom but also commit to protecting our digital independence. By staying proactive and prepared, we can ensure that the fireworks remain in the sky—not in our networks.

Final Thoughts

As someone who has spent decades in cybersecurity and written extensively on the subject, I know that holidays like the 4th of July are a test of our resilience. Let’s use this opportunity to strengthen our defenses, educate our teams, and embrace a culture of cybersecurity that lasts far beyond the holiday.

Happy 4th of July—and stay safe, both online and offline!

The post Cybersecurity on the 4th of July: Protecting Your Digital Independence appeared first on .

Read More

Uncategorized

ISO/IEC 42001:2023: A Comprehensive Framework for Artificial Intelligence Management Systems

 

There is no mistaking that artificial intelligence (AI) is transforming industries and reshaping societal norms; the need for strong governance and management frameworks has never been more vital. Enter ISO/IEC 42001:2023, the first international standard dedicated to Artificial Intelligence Management Systems (AIMS). This standard, developed by the respected International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), offers a structured approach for organizations to develop, deploy, and manage AI systems responsibly. Here’s an in-depth look at what ISO/IEC 42001:2023 entails and why it’s essential.

Understanding ISO/IEC 42001:2023

ISO/IEC 42001:2023 provides a framework for organizations to systematically manage the risks, opportunities, and societal impacts associated with AI systems. It applies to any organization, regardless of size, type, or sector, that develops, offers, or uses AI systems. The standard emphasizes ethical issues, accountability, and continuous improvement, ensuring that AI systems align with organizational goals and societal expectations.

Core Components of the Standard

The standard mirrors the structure of other ISO management systems, such as ISO 9001 (Quality Management) and ISO/IEC 27001 (Information Security), following the Plan-Do-Check-Act (PDCA) cycle. Here are its main components:

1. Context of the Organization

Organizations must identify internal and external factors that influence their AI systems. These factors could include legal and regulatory requirements, ethical considerations, societal expectations, and technological advancements. They must also define their role in the AI ecosystem—whether as developers, users, or regulators—and determine the scope of their AI management system.

2. Leadership and Governance

Top management plays a pivotal role in establishing an AI policy that aligns with organizational goals and societal expectations. This policy must address trustworthiness, fairness, transparency, and safety, and it should be communicated across the organization.

3. Risk and Impact Management

The standard introduces specific processes for:

  • AI Risk Assessment: Identifying and analyzing risks that could hinder organizational objectives or harm individuals and societies.
  • AI Risk Treatment: Implementing controls to mitigate identified risks, with reference to Annex A, which provides a comprehensive list of control objectives.
  • AI System Impact Assessment: Evaluating the societal and individual consequences of AI systems, including their fairness, accountability, and potential for harm.

4. Operational Planning and Control

Organizations must ensure that AI systems are developed, deployed, and monitored in a responsible manner. This includes maintaining detailed documentation, conducting regular audits, and addressing nonconformities through corrective actions.

5. Continual Improvement

ISO/IEC 42001:2023 emphasizes the importance of ongoing evaluation and improvement. Organizations are required to monitor the performance of their AI systems, review management processes, and adapt to changing circumstances.

Key Themes and Objectives

1. Responsible AI Development and Use

The standard prioritizes ethical AI practices, focusing on transparency, fairness, and accountability. It encourages organizations to assess the societal impacts of their AI systems and implement safeguards to prevent harm.

2. Comprehensive Documentation

From risk assessments to operational procedures, the standard mandates thorough documentation to ensure traceability, consistency, and compliance.

3. Integration with Existing Standards

ISO/IEC 42001:2023 is designed to integrate seamlessly with other management systems, such as ISO/IEC 27001 for information security and ISO 9001 for quality management. This holistic approach enables organizations to address AI-specific challenges within their broader operational frameworks.

4. Human Oversight

The standard underscores the importance of human involvement in AI systems, particularly in decision-making processes. It provides guidelines for ensuring that humans can override AI decisions when necessary and that users are adequately informed about system limitations.

5. Supplier and Customer Relationships

Organizations must establish clear responsibilities when working with third-party suppliers or customers. This includes ensuring that AI components meet ethical and technical standards and that customers are informed about the intended use and limitations of AI systems.

Societal and Individual Impacts

One of the standout features of ISO/IEC 42001:2023 is its focus on societal and individual impacts. The standard requires organizations to assess how their AI systems affect:

  • Fairness and Equity: Ensuring that AI systems do not perpetuate biases or discriminate against specific groups.
  • Privacy and Security: Safeguarding personal data and preventing unauthorized access.
  • Safety and Health: Minimizing risks to physical and psychological well-being.
  • Environmental Sustainability: Considering the ecological footprint of AI systems, including energy consumption and resource use.

By addressing these areas, the standard aims to build trust in AI technologies and mitigate potential harms.

Why ISO/IEC 42001:2023 Matters

As AI continues to permeate every aspect of society, from healthcare to finance, the need for standardized governance frameworks becomes increasingly urgent. ISO/IEC 42001:2023 provides organizations with the tools to:

  • Navigate complex regulatory landscapes.
  • Build trustworthy and transparent AI systems.
  • Align AI practices with ethical and societal values.
  • Foster innovation while mitigating risks.

By adopting this standard, organizations can demonstrate their commitment to responsible AI development and use, gaining a competitive edge in an increasingly AI-driven world.

Conclusion

ISO/IEC 42001:2023 is more than just a management standard; it is a blueprint for the responsible governance of AI systems. By addressing ethical considerations, societal impacts, and operational challenges, organizations can harness AI’s potential while protecting the interests of individuals and communities. As AI continues to evolve, this standard will play a key role in shaping a future where technology serves humanity responsibly and fairly.

You can find a copy of the ISO/IEC 42001:2023 standard on the ISO website here.


If you would like to know more about how AI and Humanity can coexist, check out this book.

The post ISO/IEC 42001:2023: A Comprehensive Framework for Artificial Intelligence Management Systems appeared first on .

Read More

Uncategorized

The Future of Cybersecurity: Integrating AI While Managing New Risks

 

This week, I attended the Gartner Security & Risk Management Summit, where the main topic centered on integrating Artificial Intelligence into cybersecurity programs without compromising security. These are some key points I took away from the summit.

The integration of Artificial Intelligence (AI) in cybersecurity represents both a revolutionary opportunity and a significant challenge for organizations worldwide. As highlighted at the recent Gartner Security & Risk Management Summit, while AI offers transformative potential for enhancing security operations, it also introduces unique risks that require careful management and strategic planning.

The Current State of AI in Cybersecurity

The cybersecurity landscape is experiencing a significant shift, with Generative AI (GenAI) emerging as a primary focus of recent investments. Major organizations, such as IBM, Microsoft, and Sony, have already demonstrated successful implementations of AI in their security operations, showcasing the practical value of these technologies in real-world scenarios.

AI’s Role in Enhancing Cybersecurity Resilience

AI has been utilized in cybersecurity for decades, but recent novel investments are primarily in Generative AI (GenAI). AI can significantly improve cyber resilience by boosting both efficiency and efficacy. Key areas where AI can enhance cybersecurity include:

  • Planning and Monitoring: Predictive capabilities like CVE prioritization/remediation, AI-led tabletops/scenarios, secure coding, third-party risk assessment, behavioral detections, attack surface topology mapping, and intelligent exposure management.
  • Acting: Automation in malware analysis, distributed security automation, polymorphic defenses, and AI-enabled indicators/metrics/signals.
  • Operational Efficiency: Augmenting security operations, application security, incident response, and threat intelligence. For instance, by 2027, 25% of common Security Operations Center (SOC) tasks are predicted to become 50% more cost-efficient due to automation and hyperscaling.

Unique Risks and Challenges of AI in Cybersecurity

The integration of AI introduces several distinct risks that organizations must manage:

  • Increased Resource Demands and Spending: Through 2025, GenAI is expected to lead to a surge in required cybersecurity resources, resulting in an incremental spend of more than 15% on application and data security.
  • Magnified Technical Debt: AI not only exposes but also magnifies existing technical debt through its extensive data access and agency.
  • Probabilistic and Unpredictable Nature: AI is probabilistic, not deterministic, meaning unpredictability is inherent to its value, making it difficult to control.
  • New Attack Surfaces and Threats: AI introduces new attack surfaces and threats, including data loss, prompt injection, and model theft. Malicious actors can leverage GenAI for the development of deepfakes, malware, disinformation, and enhanced phishing attacks, thereby amplifying business risks such as sensitive data exposure, potential copyright violations, bias, hallucination, input/output violations, and brand damage. By 2028, 33% of enterprise software applications are expected to incorporate agentic AI, which introduces additional risks due to its autonomous nature and interaction patterns.
  • Internal Violations: Through 2026, at least 80% of unauthorized AI transactions will be caused by internal policy violations (information oversharing, unacceptable use, misguided AI behavior) rather than malicious attacks.
  • SOC Skill Erosion: By 2030, 75% of SOC teams may experience erosion in foundational security analysis skills due to overdependence on automation and AI. This can lead to a decrease in tacit knowledge, erosion of new skill sets, and a decline in critical thinking.

Strategies for Effective AI Integration and Risk Management

To effectively integrate AI into cybersecurity while managing its unique risks, organizations should focus on the following:

  1. Build a Robust AI Governance Framework:
    • Leverage Existing Frameworks: Adopt and integrate guidance from established frameworks, including NIST AI RMF, MITRE ATLAS, OWASP Top 10 LLM, ISO 42001, and relevant federal and state regulations, such as the EU AI Act.
    • Define Roles and Responsibilities: Establish effective AI governance by identifying dimension owners (organizational, societal, customer-facing, employee-facing AI dimensions), differentiating decision rights based on unique expertise, and ensuring governance decisions address key dilemmas.
    • Security’s Role: Security leaders should take ownership of AI security governance and secure a seat at the AI committee, thereby raising awareness of risks that others may overlook. Do not attempt to own overall AI governance.
    • Cross-Functional Collaboration: Collaborate with functional leaders and end-users when defining GenAI-related policies and standards.
    • TRiSM (Trust, Risk and Security Management): Implement AI TRiSM as a “team sport” with a wide scope covering trustworthiness, fairness, reliability, robustness, efficacy, governance, legal, privacy, security, and transparency.
  1. Gain Comprehensive Visibility into Existing AI and Technical Debt:
    • Minimum Viable Visibility: Understand crucial aspects such as where users are going, what they are asking, what data is being shared or referenced, what models are being leveraged, and how third parties are using AI.
    • Secure Third-Party AI Consumption: Integrate questionnaires for third-party vendors, utilize Security Service Edge (SSE) to identify Large Language Model (LLM) traffic, and develop guidance for users regarding sanctioned and unsanctioned application use.
    • Protect Enterprise AI Applications: Develop foundational security in cloud, data, and applications; focus on tactical deployment; secure AI application use; pilot advanced TRiSM tools; upskill security champions; require testing against adversarial prompts and prompt injections; and consider data security options when training and fine-tuning models.
  1. Establish Processes for Ongoing Maintenance, Monitoring, and Validation:
    • AI Visibility and Traceability: Implement cataloging (discovery, inventory, licensing, risk scoring), automated documentation (bill of materials, model cards, regulatory reports), audit trails of state changes, mapping of AI integration with human/system processes, ownership of artifacts, data mapping, and validation of risks, regulations, and controls.
    • Continuous Assurances and Evaluation: Conduct AI security testing (red teaming, scanning) for models, applications, and agents. Validate risk and trust controls, including bias, leakage, trust, and use-case alignment. Manage posture and ensure compliance reporting.
    • AI TRiSM Runtime Functions: Deploy capabilities for model monitoring, anomalous activity detection, data protection, responsible AI filtering, runtime defense against malicious attacks, selective data obfuscation, and compliance enforcement.
    • Adopt a Crawl-Walk-Run Approach: Gradually build capabilities for maintaining, monitoring, and validating AI systems, ensuring robust data integrity and security throughout their lifecycle.
  1. Address Skill Gaps and Foster a Future-Ready Workforce:
    • Bridge Gaps: Gain internal experience, foster knowledge sharing, align with workforce development initiatives, develop flexible hiring strategies, and productize GenAI prompts.
    • Develop a Talent Strategy: Create a talent strategy focused on future security skills and needs, leading to a significant increase in CISO effectiveness.
    • Focus on New Skills: Prioritize learning prompt engineering, prompt injection, and understanding frameworks like OWASP Top 10 LLM.
    • Maintain Human Oversight: Identify areas where human-led Security Operations Center (SOC) functions must persist and define human-in-the-loop requirements to counteract the erosion of foundational security analysis skills due to automation.
  1. Adopt a Strategic, Outcome-Driven Approach to AI Adoption:
    • Support Business Demand Support the business demand for GenAI while balancing innovation with security.
    • Cultivate Relationships: Cultivate relationships outside of IT, especially with functional leaders who play key roles in GenAI strategy development.
    • Problem-Driven Adoption: Guide AI adoption by identifying the right problems to solve, rather than allowing AI to dictate use-case design. Focus on how AI can demonstrate value to solve specific problems and automate tasks, rather than just asking “What is the best AI?”.
    • Agile Roadmaps and Experimentation: Favor tactical AI experiments to learn faster and adapt to compressed time horizons. Be an “AI Tinkerer” CISO, conducting multiple safer experiments and scaling, extending, or pausing based on value, rather than making a few big bets.
    • Outcome-Driven Metrics (ODM): Define and use outcome-driven metrics for GenAI to guide defensible cybersecurity investment and evaluate AI security efforts. These metrics should encompass GenAI risk assessment, application security, quality assurance, third-party cybersecurity risk management, skills development, and data readiness.
  1. Prioritize Preemptive Cybersecurity:
    • Cyber Deterrence: Integrate cyber deterrence and preemptive cybersecurity strategies to stay ahead of AI-based attacks, as these attacks are likely to outmaneuver human-led, reactive approaches. This involves altering adversary behavior before attacks occur, for example, by disrupting how attackers monetize exploits, imposing consequences, exposing techniques, and inflicting direct and indirect costs.
    • Advanced Tools: Leverage tools like advanced cyber deception, automated moving target defense, predictive threat intelligence, automated exposure management, and advanced obfuscation.

The integration of AI in cybersecurity represents a critical evolution in how organizations protect their digital assets. By following a structured approach to implementation while maintaining awareness of potential risks, organizations can harness the power of AI to strengthen their security posture and build resilience against emerging threats.

The post The Future of Cybersecurity: Integrating AI While Managing New Risks appeared first on .

Read More

Uncategorized

Visa’s Recent Changes to Merchant Levels: Combining Levels 3 and 4

 

In a significant move aimed at simplifying compliance requirements and streamlining merchant classifications, Visa has recently announced the consolidation of its Merchant Levels 3 and 4 into a single category, now referred to as Level 3. This change is part of Visa’s ongoing efforts to adapt to the evolving payment landscape and make compliance more accessible for smaller merchants. Let’s dive into what this means for businesses and how it impacts the broader merchant ecosystem.


What Are Merchant Levels?

Merchant levels are classifications used by payment card brands like Visa to determine the compliance requirements for businesses that accept card payments. These levels are primarily based on the annual transaction volume processed by a merchant and the type of transactions (e.g., e-commerce, in-store).Previously, Visa categorized merchants into four levels:

  • Level 1: Large merchants processing over 6 million Visa transactions annually.
  • Level 2: Merchants processing 1 to 6 million Visa transactions annually.
  • Level 3: Merchants processing 20,000 to 1 million Visa e-commerce transactions annually.
  • Level 4: Merchants processing fewer than 20,000 Visa e-commerce transactions annually or up to 1 million transactions across all channels.

The recent change eliminates Level 4 by merging it with Level 3, creating a unified category for smaller merchants.


Why Did Visa Make This Change?

The decision to combine Levels 3 and 4 reflects Visa’s commitment to simplifying compliance requirements for merchants. By consolidating these levels, Visa aims to:

  1. Reduce Complexity: Many merchants found the distinction between Levels 3 and 4 confusing, especially when determining their compliance obligations. Merging these levels simplifies the classification process.
  2. Streamline Compliance: Smaller merchants often lack the resources to navigate complex compliance requirements. A unified Level 3 category ensures that these businesses have a clearer understanding of their obligations.
  3. Enhance Security Standards: By aligning smaller merchants under a single category, Visa can enforce consistent security measures, reducing vulnerabilities in the payment ecosystem.

What Does This Mean for Merchants?

For merchants previously classified as Level 4, this change brings some adjustments to their compliance requirements. Here’s what businesses need to know:

  1. Unified Compliance Obligations: Merchants now classified under the new Level 3 will need to adhere to the compliance standards previously associated with Level 3. This includes completing the appropriate Self-Assessment Questionnaire (SAQ) and, in some cases, undergoing vulnerability scans.
  2. Focus on E-Commerce Transactions: The new Level 3 category continues to emphasize e-commerce transactions, which are more susceptible to fraud. Merchants processing between 20,000 and 1 million Visa e-commerce transactions annually will fall under this category.
  3. Improved Support for Small Businesses: Visa’s consolidation effort is expected to provide smaller merchants with better resources and guidance to achieve compliance, ensuring they can protect customer data effectively.

Implications for the Payment Ecosystem

This change is not just about simplifying compliance—it’s also about strengthening the overall security of the payment ecosystem. By unifying smaller merchants under a single category, Visa can:

  • Standardize Security Measures: Consistent compliance requirements across a broader range of merchants help reduce gaps in security.
  • Encourage Adoption of Best Practices: Smaller merchants often struggle with implementing robust security measures. The new Level 3 classification ensures they are held to higher standards, fostering a more secure payment environment.
  • Support Growth in E-Commerce: With the rise of online shopping, e-commerce transactions have become a focal point for fraud prevention. Visa’s updated classification reflects this shift and prioritizes the protection of online transactions.

What Should Merchants Do Next?

If your business was previously classified as a Level 4 merchant, it’s essential to review the updated compliance requirements for Level 3. Here are some steps to take:

  1. Consult Your Acquiring Bank or Processor: They can provide specific guidance on how the changes impact your business and what steps you need to take to remain compliant.
  2. Complete the Appropriate SAQ: Ensure you are using the correct Self-Assessment Questionnaire for your transaction volume and business type.
  3. Implement Security Measures: Focus on PCI DSS compliance, including encryption, tokenization, and regular vulnerability scans, to protect customer data.
  4. Stay Informed: Keep an eye on updates from Visa and other card brands to ensure you remain compliant with evolving standards.

Conclusion

Visa’s decision to merge Merchant Levels 3 and 4 into a single Level 3 category is a welcome change for many businesses. By simplifying compliance requirements and focusing on consistent security standards, Visa is making it easier for smaller merchants to navigate the complexities of payment security. For merchants, this is an opportunity to enhance their security posture and build trust with customers in an increasingly digital world.

You can read more about this change on Visa’s website.

The post Visa’s Recent Changes to Merchant Levels: Combining Levels 3 and 4 appeared first on .

Read More

Uncategorized

Scan Interference

 

I believe that scan interference is one of the primary issues that many customers and ASV providers don’t understand. This post is to help everyone understand what it is and how to remediate it during an ASV scan.

To ensure reliable scanning, the ASV scan solution must operate without interference from active protection systems. Here, “active” refers to security systems that adjust their behavior based on data from non-attack network traffic patterns. These systems may include intrusion prevention systems (IPS)web application firewalls (WAF)network security controlsquality of service (QoS) devices, and even spam filters that block traffic based on prior SMTP data.

Non-attack traffic refers to legitimate network patterns that do not indicate malformed or malicious activity. In contrast, attack traffic includes malicious patterns or those matching known attack signatures, malware, or packets that exceed the maximum allowed IP packet size.

If an ASV identifies that an active protection system has blocked or filtered a scan, it must follow the procedures outlined in the Resolving Inconclusive Scans section (7.6) of the ASV Program Guide.

Resolving Inconclusive Scans

There are three methods to address an inconclusive scan:

  1. Temporary Configuration Changes: The customer may need to adjust settings to facilitate the scan.
  2. Evidence Provision: The customer can provide proof that the scan was not actively blocked.
  3. Collaboration: The customer and ASV can agree on a method to conduct scans without interference.

Temporary Configuration Changes

To allow the scan to proceed without hindrance, the customer may need to implement temporary configuration changes. For instance, active protection systems like IPS and WAF should be set to permit the ASV scan to complete.

Detecting all vulnerabilities is essential to the defense-in-depth strategy emphasized in the PCI DSS. If a scan cannot identify vulnerabilities on Internet-facing systems due to blocking by an active protection system, those vulnerabilities may remain unaddressed and could be exploited by attackers whose methods do not trigger the protection mechanisms.

Conducting scans during planned maintenance windows enables customers to prepare for scans, implement temporary changes to minimize interference with ASV traffic, and monitor their systems as needed.

These suggested changes are temporary and only necessary for the duration of the ASV scan and for the relevant external-facing IP addresses.

If you would like to know more about the ASV program, you can read my other blog post here.

Note: Temporary configuration changes do not require the scan customer to “whitelist” or grant the ASV a higher level of network access.

The post Scan Interference appeared first on .

Read More