article thumbnail

How to gain a five star security reputation in hospitality

CIO Business Intelligence

Achieving and sustaining compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a daunting challenge for hotels because they handle many complex payment business cases. For example, consider the numerous new booking options and services to improve the customer’s experience during the reservation process and their stay.

Security 105
article thumbnail

Middle East cybersecurity industry explores how to engage more women

CIO Business Intelligence

The Middle East-focused Gulf Information Security Expo and Conference (GISEC), held 21-23 March 2022 in Dubai, provided a full-day panel to highlight initiatives meant to close the gender gap in cybersecurity. We need programs to mentor women who want to be in cybersecurity; the lack of skills in the market is hurting us.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MACH37 Cyber Accelerator (@MACH37Cyber) Launches 17 New Cyber Security Startups

CTOvision

Pete Jobse, CIT President and CEO and MACH37™ Executive Chairman, said, “MACH37 has created a unique public-private program that brings together domain experts, successful cybersecurity entrepreneurs, and investors familiar to the security market to create a platform that enables next generation technology to be deployed more rapidly.

Security 289
article thumbnail

3 key roles for driving digital success

CIO Business Intelligence

Product and delivery leaders: Agents of change While there are many ways to charter a program and define leadership responsibilities, I recommend leading transformation initiatives with these two key roles. Examples include: User experience specialists provide team brand, design, information architecture, and style guides.

Agile 98
article thumbnail

What makes a CIO truly great?

CIO Business Intelligence

For example, Major League Baseball scouts are in constant search for rare “5 tool” players who can hit for power, hit for average, field, throw, and run. Whenever one talks about high-performance or leadership there is a tendency to break out a list. Is there such a list for high-performance CIOs? If so, how long might it be?

article thumbnail

What is GRC? The rising importance of governance, risk, and compliance

CIO Business Intelligence

A 2023 survey of more than 1,300 respondents from around the globe who either influence or manage their organization’s risk and compliance programs found that only 53% rated their programs as mature. For example, this means making sure that IT systems and the data contained in those systems are used and secured properly.

article thumbnail

New York Takes Bold Stance Against Hospital Cyber Attacks

SecureWorld News

Hospitals will be required to implement comprehensive cybersecurity programs, including vulnerability assessments, access controls, and security awareness training for their employees. Here are a few examples. The act mandates risk assessments, incident reporting, and data breach notification procedures.