Data Protection Protect your data with confidence A “check-the-box” approach to compliance will not protect your reputation. Proactive programs, measures and policies will.Confidently maintain and protect your data, wherever it lives. Protiviti determines the impacts of data security regulatory and contractual requirements, assesses your alignment and capability to meet those expectations, remediates key processes and technologies, and helps implement changes to achieve and maintain compliance—all while improving your data security posture.Our approach focuses on three core concepts: identifying and securing your most valuable assets; continuous monitoring; and a structured, fast response to a breach.Protiviti helps you confidently maintain and protect your data, wherever it may reside. We help you understand the impacts of data security. Regardless of where your data resides, Protiviti helps you maintain and protect it, and to understand the impacts Our data protection services Pro Briefcase Data Identification and Security Organizations want to know what data matters most. Protiviti’s data protection methodology identifies critical data, implements measures to protect it, and establishes a program to sustain and maintain data security as data evolves. Pro Building office Data Security Compliance No matter the compliance framework (PCI , HITRUST, HIPAA, SOC 2, SWIFT , NYDFS , FedRAMP, FISMA, CMMC ) we scope your environment, address compliance gaps, and implement policies, procedures and technical solutions to meet any regulatory and contractual obligations. Pro Document Consent Third-Party Risk Management Organizations increasingly rely on third parties but struggle to balance the level of investment in securing partners. The most effective TPRM programs are repeatable, quantifiable, and manage more risk per dollar spent. Pro Document Files Secure Architecture Securely maintaining technologies, systems, and networks is a challenge most companies face. Whether aligning with compliance requirements or adopting zero trust architecture , we bring skilled expertise to the design and implementation of your security. Pro Document Stack Cyber Defense and Response No matter how much you invest in security, incidents happen. Protiviti offers full-service incident response teams that optimize your environment to address dynamic data threats. Pro Legal Briefcase Cyber Resilience Ensure your data is available when you need it. Knowing where vulnerabilities lie will help you recover more quickly and minimize customer harm. Protiviti helps you detect, prevent, respond to, recover and learn from operational disruptions. Beat the Clock for CMMC Compliance The final rule for CMMC Compliance was published on October 15, 2024. At Protiviti, we understand the critical importance of cybersecurity in protecting U.S. Government data, and can tailor our CMMC compliance services to meet you where you are in your compliance journey. Explore Our Services Featured insights and client stories SURVEY CFOs Address a Data Security and Privacy Triple Threat CFOs prioritize addressing the trifecta of data security and privacy threats due to rising cyber warfare, extortion risks, and stringent regulatory requirements. CLIENT STORY Enhancing Consent Management with OneTrust Protiviti and OneTrust helped a global software and IT solutions provider enhance its consent management processes, ensuring regulatory compliance. VISION Future of Privacy Forum CEO Jules Polonetsky on “exciting but risky” road ahead “For better or worse, the dam burst and everyone, from the most conservative organization to the wildest startup, is rolling out [AI] stuff that comes with lots of risks.” “So we're at an inflection point, and we’ll either, over time, see some of... IN FOCUS The DoD unveils the Cybersecurity Maturity Model Certification Program: A primer for defense contractors As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Program... INSIGHTS PAPER Best Practices for Building a Sustainable PCI DSS Compliance Program Creating and maintaining a sustainable PCI DSS compliance program is a crucial and complex task for organizations to protect payment card transactions and uphold consumer trust. However, despite the PCI DSS standard being around for almost 20 years,... VISION Former CISO on what boards are getting wrong about data protection and privacy “We had two well-known CISOs with two very public companies charged with felonies through the SEC, which led to the cybersecurity disclosure rule being implemented after the first one. That sent shockwaves through the CISO industry.”“It’s the... IN FOCUS NIST unveils post-quantum cryptography standards. What does it mean? Earlier this month, the National Institute of Standards and Technology (NIST) approved three post-quantum cryptography (PQC) standards that constitute the first significant steps towards protecting critical services from quantum computers being used... Button Button The Protiviti advantage Protiviti provides expert-level data security consulting solutions to FORTUNE 1000® and FORTUNE Global 500® companies across the world. We provide our clients with data security expertise that spans numerous regulations across all industries.Helping organizations comply with data security requirements is part of our DNA.PCI: Protiviti is one of the largest and most experienced PCI QSA firms (since 2002) and a four-time member of the PCI SSC’s Global Executive Assessor Roundtable. We frequently present at the Council’s community meetings and partner with global merchants and service providers to aid our clients on their journeys to achieve and maintain PCI certification.CMMC : Protiviti Government Services is a CMMC-AB Registered Provider Organization™ (RPO) providing accredited consulting services around the Cybersecurity Maturity Model Certification (CMMC) program.HITRUST and SWIFT : We are a HITRUST CSF Assessor and SWIFT CSP and partner with clients seeking to certify compliance. Leadership Chip Wolford Chip is a Managing Director in Protiviti’s Technology Consulting practice focusing on Data Security & Privacy. He presently leads Protiviti’s Data Security practice and focuses on Payment Card Industry and Healthcare Information Security as well as supporting ... Learn More David Taylor David is a Managing Director based in Protiviti’s Orlando office. He has more than 20 years of experience in information security and IT Audit. He is a former federal agent and Computer Crime Investigator (CCI) for NASA’s Inspector General and for the United States Air ... Learn More Dan Hansen Dan is a Managing Director in Protiviti's IT Consulting Practice and leads the Security & Privacy practice in the San Francisco Bay Area. He has over 16 years of IT process and risk management experience and has led numerous IT engagements, focusing on information ... Learn More Jacob Iley Jacob is a Managing Director with 20 years of experience in strategic cybersecurity program development and transformation, risk assessments, regulatory and industry compliance, and cybersecurity and privacy assessments. Jacob serves global clients across various ... Learn More Paul Kooney Paul is a Managing Director with over 25 years of experience in both the public and private sectors focused on innovative third-party risk management program development, payment card industry security, and cybersecurity and privacy compliance. Paul is a member of the ... Learn More Muazzam Malik Muazzam has 20+ years of experience in partnering with clients to design, implement, and transform security programs, and solve complex cybersecurity and data privacy challenges. Muazzam is known for his methodical approach to building sustainable security solutions for ... Learn More Michael Porier Michael Porier is a Managing Director in the Houston office and is one of the founding members of Protiviti since 2002. Michael is the Lead for the local Cybersecurity Practice, National Lead for the Government Industry Cybersecurity Program, and is one of firms ... Learn More Jeffrey Sanchez Jeff is currently focused on the implementation and assessment of privacy and security standards in global technology companies, especially those subject to FTC enforcement actions. Jeff also has extensive experience and expertise in Payment Card Security (PCI), HIPAA ... Learn More Cyber Risk Quantification Empowers Multichannel Retail Giant to Improve Risk Management Protiviti utilized cyber risk quantification to enhance the risk management process of a top 10 North American multichannel retailer. CMMC Compliance: Strategies for Everyone Doing Business with the Government Watch our webinar on-demand Case Studies Protiviti conducts vendor assessments for global Fortune 100 healthcare organization Situation: This highly-decentralized client had disparate vendor security assessments and governance policies, which led to repeated assessments and a lack of a common view of vendor risk.Value: Protiviti enabled the client to properly modify a COTS application in six months and build a strong foundation for an employee training module. Protiviti leads division of Fortune 50 pharmaceutical corporation to HITRUST certification Situation: The diagnostic device division of this company needed a third-party partner to conduct a HITRUST certification controls assessment to identify and remediate control gaps.Value: Protiviti assisted in developing a plan and timeline for HITRUST certification. Major payment card brand recruits Protiviti for PCI compliance support Situation: This global brand needed assistance with its payment card industry (PCI) compliance program.Value: Protiviti’s experience with acquiring banks and merchant compliance initiatives assisted in the development and rollout of this client’s compliance program for key stakeholders. Bank drafts Protiviti to improve data privacy and information security Situation: This client needed to update policies and procedures, with organizational alignment between the first, second, and third lines of defense.Value: Protiviti updated the client’s governance and policies to improve risk assessments, increase visibility into the risk profile of critical systems and infrastructure, and challenge existing data security practices to enhance enterprise regulatory compliance.