Life After Compliance march 2010 v2

SafeNet
24. May 2010
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
1 von 33

Más contenido relacionado

Was ist angesagt?

Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...ARMA International
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Mukesh Chinta
Information Security Management. Security solutions copyInformation Security Management. Security solutions copy
Information Security Management. Security solutions copyyuliana_mar
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja

Destacado

Whose Cloud is It Anyway - Data Security in the CloudWhose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudSafeNet
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudSafeNet
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlWhose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlSafeNet
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance EvolvedSafeNet
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...SafeNet
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelCloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelSafeNet

Similar a Life After Compliance march 2010 v2

Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetInternet Security Auditors
Securing Call Center Recordings Webinar 4 16 09Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09Ginney McAdams
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...Ulf Mattsson
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdfControlCase
Maloney SlidesMaloney Slides
Maloney Slidesecommerce
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics

Similar a Life After Compliance march 2010 v2(20)

Más de SafeNet

Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilityNot Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilitySafeNet
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeNet
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSafeNet
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...SafeNet

Más de SafeNet(20)

Último

Common WordPress APIs_ Settings APICommon WordPress APIs_ Settings API
Common WordPress APIs_ Settings APIJonathan Bossenger
Webhook Testing StrategyWebhook Testing Strategy
Webhook Testing StrategyDimpy Adhikary
GDSC ZHCET Google Study Jams 23.pdfGDSC ZHCET Google Study Jams 23.pdf
GDSC ZHCET Google Study Jams 23.pdfAbhishekSingh313342
Solving today’s Traffic Problems with Sustainable Ride Hailing SolutionSolving today’s Traffic Problems with Sustainable Ride Hailing Solution
Solving today’s Traffic Problems with Sustainable Ride Hailing SolutionOn Demand Clone
10 reasons to choose Galaxy Tab S9 for work on the go10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the goSamsung Business USA
"Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala "Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala
"Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala Fwdays

Último(20)

Life After Compliance march 2010 v2

Hinweis der Redaktion

  1. So What: >25 years focus on information security >Size matters >Private, Profitable, and Proud of it >Certifications are important >Customers count on SafeNet
  2. The most classified information in the world World’s largest deployment of top secret communications globally Between the KIV-7 and secure telephones, almost every piece of classified material transmitted is protected by SafeNet technology (Note – In some locales, it may be preferable not to mention too much about our association with the U.S. government, so this section might be amended to remove this reference) The most money that moves in the world 80% of the worlds bank to bank electronic transfers are protected by our HSM’s Our products are used by SWIFT – who carry 80% of the bank to bank electronic transfers – and by the U.S. Federal Reserve to securely transfer funds within the U.S. banking system – a total of more than 1 trillion dollars A DAY! The most digital identities in the world - Most major digital identity deployments rely on SFNT The most high-value software in the world - 42 million Sentinel keys have been sold to protect software vendors against piracy. The most of any vendor.
  3. Market forces, such as compliance, globalization, outsourcing, SaaS, and cloud computing, have driven greater proliferation of data, information exchange, and access to data by “outsiders.” As this happens, the threats continue to mount, as more people inside and outside of the organization need access to data. More questions and concerns are introduced: The traditional boundaries of an enterprise have disappeared as data is hosted, outsourced, managed, or accessed by partners, third-party vendors, and a mobile workforce How do you protect your information assets without restricting business processes? The outsider has become the insider, and even “authorized” users need secure access control. There is no clear delineation between bad guys and good guys.
  4. We can’t be complacent, even when the numbers are steady, there is always a spike pending
  5. The US has been diligent about documenting security breaches. Here you will find two tracks of information. The bar is the number of payment cards affected from a data breach. Opponents of PCI will claim that it isn’t working highlighting the two spikes that occurred in 2007 and 2009. What is important to note is this is the time of the largest breaches in history: TJX and Heartland Payment Processing. In fact, the number of breaches in 06 and 08 are quite low. The opponents will then say that those numbers are consistent with 2003 and 2004 prior to the standards release, but back then, breach notification laws were not yet in place, therefore, organizations were not required to disclose. Countless breaches occurred during this period which were not reflected. The second line is the trend line of number of incidents. This line is from numerous segments including: Healthcare, Government, Universities, only a small number of these are payment card related.
  6. Since the PCI mandate was introduced in 2005, you will notice that the cost per breached record has increased 47%. Several elements go into this figure: litigation costs associated with the breach, pr costs, cost for notifications, consulting and repairs, and campaigns for brand repair. What can not be measured, is the lost opportunity costs and revenues from people turning away from your organization.
  7. There are two ways to look at PCI DSS, one is that it is the ceiling, the most any organization wants to do. The mandate is seen as overly complex and not easily adaptable within their infrastructure. Others look at this as an opportunity to establish budget and implement a strong security platform for protecting all of their information, not just credit cards. Often times these companies will have a dedicated officer tasked with implementing and sustaining compliance, with a set budget.
  8. For a number of years, the Aberdeen Group have conducted a bench marking study to compare PCI implementations amongst best in class organizations compared to the industry averages. The approaches they take are often different, but to start, it is best to take a step back and think about the approach. Don’t just look at PCI as a bunch of check boxes. Often refer to a CoBIT or ISO standard for Information Security and use those frameworks and best practices for approaching your compliance implementation. With this approach, organizations have been able to implement good security policy, while also becoming PCI compliant. The time to market was actually consistent at 11 months, but the cost savings from taking a holistic approach was half. Even for the areas that are the most difficult to meet, such as protecting stored cardholder data. Often times organizations will segment out the credit card data separate from the other information but this results in extra management and operational issues and overhead.
  9. Here you will see the different elements of the digital dozen, where the current implementation stands and the correlation to known incidences. A few requirements to mention, where we have been able to aid customers, are the protection of stored cardholder data, developing and maintaining secure applications, and restricting access to a business need to know. The reason for these higher numbers often relate back to complex systems, gap in security codes, and confusion of the various technologies in the market. To offset these problems, it is important to start by scoping your project and doing a data discovery investigation to determine where the sensitive information resides. It is also important to trust your vendors to ensure you are buying payment applications that are PA DSS compliant, and if you are building your own application, secure the application development codes. There is also a lot of fodder in the marketplace about end-to-end encryption, in actuality, there is no one vendor that has a complete solution. There are multiple vendors, like SafeNet, who can offer several products that solve several compliance issues, but no one can solve everything. The important thing when doing vendor selection is Trust, Experience, and Security.
  10. When getting started in the PCI implementation, there are a few starter questions to ask
  11. In the states a lot of the big retailers fought PCI in the beginning, including a joint trip down to DC to take on the “big three”. After this meeting more than one of them had a publicly disclosed breach. Some of this is derived from ignorance – they have no idea of the techniques that are being employed to get at the sensitve data (refer to Trisha’s preso) and that it is a business/criminal enterprise some of which is which is sponsored by unfriendly government groups. PCI is now at 1.2, ex: w/ 1.1 key rotation is no longer defined as “periodic” but once per annum PCI Auditors are not as open to “compensating controls” which were once an interim mechanism for passing a PCI audit, after a number of breaches by organizations that had passed a PCI audit but had systems which were passed with compensating controls. It’s more than just PCI. Worked with a retailer who’s launch for a new brand of stores was leaked on the Internet, including their catalogue shoot. (IP)
  12. To ensure a successful project. Get everyone involved – this will help with buy-in and cooperation where different groups will feel they are part of the project. There are going to be few people (if any) who have an end-to-end knowledge of all the systems. Not all these people have to be involved with all meetings, etc. but there needs to be good communication to keep everyone in the loop. I’ve been talking to some organizations that have been working on this for over three years. Communication includes educating end users – why we are doing this and how you can help and why it is in your interest. Outside help – with the economy, etc. – many organizations are running barebones and don’t have the cycles to take on another project. You can also leverage the experience of an outfit that has been through this before.
  13. If you don’t know where the data is, you can’t protect it. Establish classification PCI, PII – sensitivity levels, etc.
  14. After data and discovery phase, you can establish what your threat model is Example, CSR who pages through screens of customer data and writes down CC#s or takes pictures using their cell phone (rate limiting would help and/or masking data) Business need to know
  15. Absolute minimum to do job, change evaluate at business processes. For example if 95% of the time CSRs can get by with last four of CC# for validation only allow CSRs access to last 4 and requeu the 5% to supervisors or a special group of CSRs. From Data dsicoverety and classification and threat model one can establish policies and procedures Those with a business need to know Eliminate data – Reports, backups, log files, archives, etc. I had 100’s of thousands if not over a million SS#s along with patient diagnostic codes, full address, name, etc.
  16. Data can be encrypted in a number of different locations. Encrypting at the Storage/Tape level provides protection against physical attack such as theft of the storage device or tape. The number of different attacks that you can protect against increases progressively as you encrypt at the file, database and finally at the Application level, where a solution is able to protect against physical attack as well as many different logical attacks that could be perpetrated from either outside of the enterprise or by a malicious inside user or administrator. There is incrementally more development effort required for more secure solutions. This of course needs to be considered when resources are scarce. On the other hand, as enterprises scale, budgets and requirements change and it is unfortunate when a company finds itself in the situation where they have spent a major portion of their budget on a solution that does not scale or fully meet their requirements. For the above reasons, enterprises that are presented with proposals from a variety of different solution-specific vendors often find it difficult to make a decision. ____________________________________________________ Key Message: Security and Deployment Effort vary considerably based on where encryption is deployed
  17. The market is changing…DP 1.0 technologies are no longer adequate for today’s enterprise organization. 1.0 is where many organizations are at today, this is where many companies are stuck. 2.0 is where the data protection market is headed. Let’s take a look at each one of these…(go through each row) SafeNet’s Approach: Data-centric Protection What's Changing Data-conscious vs. perimeter/network-centric Proactive protection vs. passive protection Why Is It Happening Data was born to be free. Passive protection techniques of trying to constrain data movement based on ‘source/destination’ or ‘all or nothing’ protection are not enough anymore What To Do Data-conscious security infrastructure, providing persistent data protection as data is created, used, stored, moved What You Gain Proactive data protection: Protect once, comply many Protected infrastructure What To Look At Scalable and extensible infrastructure with integrated policy, key and ID management platform
  18. After reviewing the best practices and determining which approach to use for your implementation there are a few initial questions you must ask:
  19. Many customers will use one or more approaches to protecting their data