If you are a Chief Information Security Officer, Chief Information Officer, Chief Technology Officer, Director of Information Technology, or bear a similar title in your organization, your business calendar for the first quarter of 2025 is filling up fast. Among the important dates you should be monitoring are several key compliance deadlines for implementation of new security measures, including:
All three regulations include new, more rigorous requirements for supply chain security.
The Digital Operational Resilience Act (DORA), also known as EU 2022/2554, requires full mandatory compliance by January 17, 2025.
It is vital to understand that this regulation is not confined to Europe. It affects businesses beyond those in the European Union, including the U.S. and other countries. Specifically, DORA affects:
The Digital Operational Resilience Act is an integrated, comprehensive regulatory framework that was developed in response to the critical reliance on digital technology throughout the financial industry in the European Union. DORA took initial effect January 16, 2023, and allowed two years for implementation, with a final compliance deadline of January 17, 2025.
DORA is the first regulation of its kind to bring third-party providers of information technology and communication technology (ITC) services under direct financial supervision and regulation. This is mandatory to reduce supply chain vulnerabilities and strengthen supply chain security.
If your organization offers financial services in the European Union or provides third-party ICT services to financial entities in the EU, you are almost certainly subject to DORA requirements. The good news is that if you have already implemented the NIST Cybersecurity Framework or a similar security framework or standard, you are probably much closer to DORA compliance than you think. To ensure that your organization meets the DORA security compliance deadline, act now to conduct a risk assessment against DORA requirements and find out where you stand.
Version 4.0 of the Payment Card Industry Data Security Standard was published on March 31, 2022, replacing the previous version, PCI DSS 3.2.1. The newest version, 4.0.1, was published in June 2024 to address formatting and typographical errors discovered in v4.0 and provide additional implementation guidance for users. On December 31, 2024, v4.0 (with its typos and errors) was officially retired, and PCI DSS v4.0.1 is now the only active version of the standard. The complete v4.0.1 standard is available on the PCI Security Standards Council website.
Compliance with PCI DSS 4.0.1 is required by March 31, 2025. All organizations must implement the security requirements by this date and demonstrate compliance with those requirements in their next annual risk assessments. The following four activities are essential to implementing the standard and thereby improving the security of payment account data:
These steps must be repeated annually by merchants and other payment card industry members. In addition, all merchants are required to submit quarterly vulnerability scans. Regular internal and external scans are invaluable in creating a secure perimeter and effectively safeguarding cardholder data.
The PCI Data Security Standard was developed to reduce vulnerabilities, strengthen security, and avoid costly data breaches within the payment card industry. Compliance is mandatory. With March 31, 2025, less than three months away, there’s not a moment to waste in meeting this key security compliance deadline.
At present, DoD contractors, subs, and suppliers must comply with the original Cybersecurity Maturity Model Certification 1.0, which allows an honor system for verifying compliance. An important goal of the new CMMC 2.0 is to further strengthen cybersecurity throughout the supply chain by making compliance more consistent and “enforcing the protection of sensitive unclassified information,” according to the DoD website. At Levels 2 and 3, objective third-party verification of compliance will now be required.
Be Sure You Allow Plenty of Time! Don’t let the extended 2.0 timeline fool you into postponing any of the required activities. Simply preparing for your official assessment can take six months to a year-and-a-half depending on your level. Scheduling your official CMMC 2.0 assessment may require a lengthy wait due to high demand for a relatively low supply of authorized assessors. Additionally, Level 3 contractors are responsible for ensuring their suppliers and subs are compliant with CMMC 2.0, adding to their timelines.
The following activities are required for full compliance with CMMC 2.0:
Several security compliance deadlines occur in the first quarter of 2025 that affect CISOs and other security executives in many organizations. The Digital Operational Resilience Act (DORA), with its global reach, becomes mandatory on January 17, 2025. Compliance with the newest Payment Card Industry Data Security Standard 4.0.1 is required by March 31, 2025, affecting merchants and payment processors who accept American Express, MasterCard, Visa, and other cards. And organizations in the DoD supply chain will begin to see new security requirements and third-party assessments incorporated into their contracts to comply with Cybersecurity Maturity Model Certification 2.0.
Responsibility to your stakeholders dictates that you understand the impact these new laws may have on your organization and take appropriate and timely actions to comply.
Reminder! Sponsored by the National Cybersecurity Alliance, Data Privacy Week 2025 runs from January 27 to January 31. This year’s theme is Take Control of Your Data, and you can learn more at StaySafeOnline.