Payment Card Industry Data Security Standard (PCI DSS)

Personal Card Industry Data Security Standard (PCI DSS) PCI DSS, or the Payment Card Industry Data Security Standard, is a set of security guidelines and practices designed to protect credit and debit card transactions from data theft and fraud. It outlines requirements for secure processing, storage, and transmission of cardholder information. These standards apply to […]

Platform as a Service (PaaS)

Platform as a Service (PaaS) Platform as a Service (PaaS) is a cloud computing model that provides a comprehensive environment for developing, testing, deploying, and managing applications. PaaS delivers infrastructure components such as servers, storage, and networking, along with middleware, development tools, and database management systems. Developers can build and customize applications without worrying about […]

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) Public key infrastructure (PKI) is a framework of policies, technologies, and procedures used to create, manage, distribute, store, and revoke digital certificates and public keys. PKI enables secure communication and authentication over networks by using a pair of cryptographic keys: a public key that can be shared openly and a private […]

Physical Security

Physical Security Physical security refers to the measures and controls implemented to protect physical assets, such as hardware, networks, and data storage devices, from unauthorized access, damage, theft, or destruction. This involves securing facilities through barriers, surveillance, access controls, and environmental safeguards like fire suppression and climate control. Effective physical security ensures that only authorized […]

Phishing

Phishing Phishing is a type of cyberattack in which attackers disguise themselves as trustworthy entities to deceive individuals into providing sensitive information, such as usernames, passwords, and credit card details. This is typically done through fraudulent emails, websites, or text messages that appear legitimate. Once the victim provides the requested information, attackers can use it […]

Patch Management

Patch Management Patch management is the systematic process of identifying, acquiring, testing, and applying software updates or installing “patches”. These patches are essential for fixing bugs, addressing security vulnerabilities, and improving functionality in applications and systems. Effective patch management ensures that systems remain secure and up-to-date, enabling optimal performance. This practice involves regularly monitoring for […]

Personal Data Protection Act (PDPA)

Personal Data Protection Act (PDPA) Personal Data Protection Act, or PDPA,  is a legal framework established to regulate the collection, use, disclosure, and protection of personal data. The PDPA aims to safeguard individuals’ privacy rights while allowing organizations to use personal data for legitimate business purposes. Enacted in Singapore and effective since 2014, the Act […]

Print Security

Print Security Print security refers to the practice of protecting sensitive information handled by printers and related devices within an organization. It involves implementing measures to safeguard against unauthorized access, data breaches, and misuse of printed documents. Print security strategies include user authentication, secure print release, encryption of print jobs, monitoring and auditing of print […]

Provisional Permission

Provisional Permission Provisional permission is a temporary authorization granted to individuals or organizations, allowing them to carry out specific activities or operations under certain conditions and within a defined period defined by the policy. The concept of provisional permission is commonly applied across various sectors to ensure that essential activities can proceed without undue delay […]

Personally Identifiable Information (PII)

Personally Identifiable Information (PII) Personally Identifiable Information (PII) is defined as any data that permits the identification, by either direct or indirect means, of an individual to whom the information applies. PII can directly identify a person (examples are name, address, phone number, social security number, any other ID number or code, and email address) or […]

Permission Control

Permission Control Permission control refers to ability to control a particular action, such as View, Edit, and Print, on a document secured with Enterprise DRM. A user can only perform an action on a secured document when granted the proper permission, either as set via centralized policy management, a data owner granting specific permission or upon requesting provisional […]

iSMG Data Security Summit: Dallas

May 15, 2025
Renaissance Dallas at Plano Legacy West Hotel

Join us at our session to learn more about data security, privacy, and governance in the age of LLMs.

Keep me informed