Information Security Leader, Author, Instructor and Speaker

Default utility Image

The State of PCI DSS: The Good, The Bad and The Ugly TAGS: | Nine years ago, the Payment Card Industry Security Standards Council (PCI SSC) quietly released the first version of the PCI …Continue reading →

Default utility Image

SOX program management, a decade later TAGS: | In 2002, a country shocked by the financial scandal of Enron and Arthur Anderson reacted by passing sweeping legislation designed …Continue reading →

Default utility Image

Documentation is Critical to Compliance Efforts TAGS: Every information security and IT compliance professional knows, deep down, that documenting compliance efforts is critical to the ongoing viability …Continue reading →

Default utility Image

An Enterprise Compliance Primer for Executives TAGS: | It’s time for that once-a-year meeting with the C-suite, where you get to tell them about the state of the …Continue reading →

Default utility Image

Inside the PCI DSS E-Commerce Security Guidelines TAGS: | Many e-commerce companies are increasingly relying upon third party service providers to assist with the processing of credit card transactions.  …Continue reading →

Default utility Image

Complying with the HIPAA Omnibus Rule TAGS: | HIPAA has a long history in the world of IT compliance.  From the initial release of the HIPAA Security Rule …Continue reading →

Default utility Image

PCI Council issues mobile payment guidance: Now what? TAGS: | | Small businesses around the world are jumping on the credit card bandwagon due to new technologies that allow the acceptance …Continue reading →

Default utility Image

PCI DSS Risk Assessments TAGS: | | The Payment Card Industry Security Standards Council (PCI SSC) recently released additional advice for merchants seeking to comply with the …Continue reading →

Default utility Image

What Do the New COPPA Rules Mean to You? TAGS: | | If you own or operate a website, you’re probably already familiar with the Children’s Online Privacy Protection Act (COPPA).  This …Continue reading →

Default utility Image

Building an IT Compliance Program in Five Steps TAGS: Let’s face it: compliance is boring.  It’s tough to face the sea of acronyms: PCI DSS, SOX, HIPAA, GLBA, FERPA, …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple