The company has started an external search for a chief compliance officer. In addition, the company has created the position of chief information security officer and is hiring outside for that position as well.
"There was not enough oversight, clearly, or enough controls."Although all facets of the Target breach are not yet known there have been reports that vendor credentials were used to inappropriately access Target systems. Knowing who can, and is, accessing which data is something that can be detected by utilizing low-cost on demand SaaS Identity and Access Intelligence analytics services.
- Amy Koo, a senior analyst at Kantar Retail in Boston
Download a white paper on data privacy breach detection. Learn how to proactively identify unauthorized breaches of data privacy, even by authorized users - with no hardware and no on-site software.Sources:
(a) SOURCE_TITLE - www.StarTribune.com, 03/05/2014