SlideShare ist ein Scribd-Unternehmen logo
1 von 46
The Perils that PCI
Brings to Security
The Perils that PCI brings to Security
Today’s Speakers
The [Possible] Perils PCI Brings to Security
                                           Joshua Corman
                     Research Director, Enterprise Security
                                            The 451 Group
Who am I?


    Research Director for Enterprise Security, The 451 Group
     Joined The 451 Group on Oct 2009
    ►12 years in Networking and Security

      – Former Principal Security Strategist [IBM ISS]
      – Sold stealth start-up vCIS to ISS in 2002


    ►Industry   Leadership
      – Expert Faculty - The Institute for Applied Network Security (IANS)
      – 2009 NetworkWorld Top 10 Tech People to Know
      – Co-Founder: “Rugged” www.ruggedsoftware.org


    ►Things   I’ve been researching:
      −   Compliance vs Security
      −   Virtualization and Cloud Computing
      −   The Economics of Security
      −   Politically Motivated Cyber (APT/APA/SMT)                          5

      −   Comprehensive Data Security
Constant Change




                                EVOLVING
                                 THREAT




              EVOLVING                             EVOLVING
             COMPLIANCE                          TECHNOLOGY
                                 COST
                               COMPLEXITY
                                  RISK




                    EVOLVING                EVOLVING
                   ECONOMICS                BUSINESS
                                                              6
Our Ecosystem




                7
Our Ecosystem



   ►Vendors:  Infrastructure
   ►Vendors: Security Incumbents

   ►Vendors: Innovative Start-Ups

   ►The Investment Community

   ►The Carriers / Service Providers

   ►The Regulators

   ►The Adversaries

   ►The End-User Community

   ►Others...                          8
Our Ecosystem v0.1




             Adversaries

        Big Vendors




                           9
Our Ecosystem v0.1




                      Adversaries



        Big Vendors




                                    10
Our Ecosystem v0.1




                      Adversaries



        Big Vendors




                                    11
Our Ecosystem v0.1




                      Adversaries




        Big Vendors




                                    12
Our Ecosystem v0.1




                      Adversaries




        Big Vendors




                                    13
Our Ecosystem v0.1




                       Adversaries
      Regulatory




         Big Vendors




                                     14
Our Ecosystem v0.1




                       Adversaries
      Regulatory




         Big Vendors




                                     15
Our Ecosystem v0.1




                       Adversaries
      Regulatory




         Big Vendors




                                     16
Information Asymmetry

 Direct -> Trust Me




                        17
Information Asymmetry

    Trust Abused




                        18
Information Asymmetry

     Blindspots




                        19
Information Asymmetry

    Compliance




                                                                                       20




                                            Free Report:
           Security derivatives: the downward spiral caused by information asymmetry
                        http://www.the451group.com/intake/securityderivatives/
Sophistication




                 21
More Likely




              22
Moving Forward…




                  23
Beyond Compliance




                    Adversaries
      Regulatory




                                  24
PCI’s Target


    PCI is not meant to protect *you*…

                    …that is your job


                            Intellectual Property
           Card Data /             Productivity
            Systems           Corporate Secrets
                         Competitive Differentiation
                                                       25
The Chosen Few…

  If we apply a “purchase and deploy” lens to PCI DSS 1.2, we can infer which
      security product categories are sure to get spending.

  The Winners: “Nine” security technologies specifically buoyed by PCI DSS
  1. Firewall (FW)
  2. Intrusion Detection Systems (IDS) – not even IPS. This can be NIDS or HIDS
  3. Anti-Virus (AV)
  4. Multi-Factor Auth
  5. Encryption (Non-OS Native)
  6. File Integrity Monitoring (FIM) – “like Tripwire”
  7. Vulnerability Assessment/Management
  8. *Log Management – not SIM or ESIM (*technically don’t need a product)
  9. OPTIONAL: Web Application Firewall (WAF) or an SDLC

  1.   PCI Service: External scans by a certified ASV (Application Scanning Vendor) –
       Quarterly scans by a certified 3rd party (or after “major” changes)
  2.   PCI Service: The QSA Audit itself (annually ranging from $10,000 - $25,000)       26
  3.   If breached (which never happens) required to use a certified QIRA for Incident
       Response
A mismatch…

     CLICK PLAY
    ►PCI   Rocks YouTube Video:
      – http://www.youtube.com/watch?v=xpfCr4By71U




                                                                       27

    ►Is   PCI the No Child Left Behind Act for Information Security?
Change, Change, Change…


    ►Solve   for all sources of change                       EVOLVING
                                                              THREAT
      – Threat
      – Technology
      – Business
      – Economics                          EVOLVING                             EVOLVING
                                          COMPLIANCE                          TECHNOLOGY
      – Compliance                                            COST
                                                            COMPLEXITY
                                                               RISK

    ►Assume    Information Asymmetry
      – Seek new sources of Information
      – Distrust Legacy Wisdom
                                                 EVOLVING                EVOLVING
                                                ECONOMICS                BUSINESS

    ►Planning   for Agility
      – Think 3-5 years
      – Look for extensibility and roadmap
                                                                                     28
How will you go beyond PCI?




                              29
Related Reading*




 Security derivatives: the downward spiral caused by information
    asymmetryhttp://www.the451group.com:80/report_view/report_view.php?entity_i
    d=60884

 The adversary: APTs and adaptive persistent
    adversarieshttp://www.the451group.com:80/report_view/report_view.php?entity_
    id=62643

 Like spinning plates: five sources of cost, complexity and risk in IT security – Part 1
    http://www.the451group.com:80/report_view/report_view.php?entity_id=62198

 Security Quarterly: E-Crime and Advanced Persistent Threats: How Profit and
    Politics Affect IT Security Strategies
    http://www.the451group.com/security/security_detail.php?icid=1060
                                                                                           30




 * We will happily provide trial access for participants of this Webinar
Joshua Corman
Research Director, Enterprise Security
                      The 451 Group

    jcorman@the451group.com
          twitter @joshcorman
Increased Security through Constant
Compliance
Agenda
Problem: Taking Too Long to Find Breaches/Risks



                 Breaches go undiscovered and uncontained
                 for weeks or months in 75 % of cases.
                                                                  2009




Breach            Average time between a breach and the detection of      Discovery
                  it: 156 days [5.2 months]
                                                              Feb. 2010



                  “…breaches targeting stored data averaged 686 days
                  [of exposure]”
                                                                  2010




                  “More than 75,000 computers … hacked” -- The attack
                  began late 2008 and discovered last month
                                                              Feb. 2010
Result: The Time Delay Of Discovery Is Costly!




Breach                                               Discovery

                  “The average cost per breach in
                  2009 was $6.7 million…”
                  Ponemon Institute, Jan. 25, 2010
Result: The Time Delay Of Discovery Is Costly!




Breach                                                 Discovery
                 “Heartland Payment Systems
                 announced today that it will pay
                 “The average cost per breach in
                 Visa-branded credit and debit
                 2009 was $6.7 million…”
                 card issuers 25, 2010 $60 million…”
                 Ponemon Institute, Jan. up to

                 Bank Info Security, Jan. 8, 2010
Over Ten Years, We Benchmarked 1500+ IT Orgs
Higher Performing IT Organizations Are More
Stable, Nimble, Compliant And Secure

 
     • Fewest
     • One-third

 
     • 5 times
     • 5 times

 
     •   14 times more
     •   One-half
     •   One-quarter
     •   10x faster

 
     • One-third
     • 8 times more
     • 6 times more
                                          Source: IT Process Institute, May 2008
Visible Ops: Playbook of High Performers




   •
   •

   •




                                           www.ITPI.org
2007: Three Controls Predict 60% Of Performance




  • Standardized configuration strategy
  • Process discipline
  • Controlled access to production systems




                                              Source: IT Process Institute, May 2006
Need: Close The Time Gap
Many Compromising Problems Are Difficult To Discover



                           Logging turned off             FTP event to foreign IP


                                      New user added
                Login successful
                                                          FTP enabled
   10 failed logins
                                                DLL modified by new user
Just Detecting Change Is Not Enough…
Policy-Based Intelligence Is Required



                          Logging turned off


                                      New user added

Typical FIM cannot make these types
alerts. Change intelligence is required.                  FTP enabled


                                                DLL modified by new user
Just Detecting Log Events Is Not Enough…
Policy-Based Intelligence Is Required



                                                   FTP event to foreign IP




                Login successful

                                   Log management alone cannot alert
   10 failed logins
                                   on these events—SIEM is required.
Relating Change Events to Log Events…
Best Chance To Discover Compromising Problems Quickly



                           Logging turned off             FTP event to foreign IP


 Events                               New user added
 of             Login successful
 Interest                                                 FTP enabled
   10 failed logins
                                                DLL modified by new user
Solution: Intelligent Threat Control




             Tripwire VIATM
             VISIBILITY  INTELLIGENCE  AUTOMATION



                                          Security
            File Integrity Monitoring
                                          Event Manager

            Compliance Policy
                                          Log Manager
            Manager


                 Tripwire Enterprise        Tripwire Log Center
Answers For Your Questions

Weitere ähnliche Inhalte

Was ist angesagt?

The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Bemorisson
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 
A model for reducing information security risks due to human error
A model for reducing information security risks due to human errorA model for reducing information security risks due to human error
A model for reducing information security risks due to human errorAnup Narayanan
 
Cisco ccna security
Cisco ccna securityCisco ccna security
Cisco ccna securityMt Mostafa
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Dale Butler
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Anup Narayanan
 
pentesting-and-buzzwords
pentesting-and-buzzwordspentesting-and-buzzwords
pentesting-and-buzzwordsClint Bodungen
 
Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Dale Butler
 
2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles Hamilton2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles HamiltonReenergize
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...TEO LT, AB
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015Dale Butler
 
It risk assessment_methodology
It risk assessment_methodology It risk assessment_methodology
It risk assessment_methodology Bruno Mmassy
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)Seungjoo Kim
 
International Security Issues: 10 Recommendations from the 2010 Security Jam
International Security Issues: 10 Recommendations from the 2010 Security JamInternational Security Issues: 10 Recommendations from the 2010 Security Jam
International Security Issues: 10 Recommendations from the 2010 Security JamIBM Government
 

Was ist angesagt? (19)

The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
SFScon17 - Luca Moroni: "Outsourcing Cyber Risks"
SFScon17 - Luca Moroni: "Outsourcing Cyber Risks"SFScon17 - Luca Moroni: "Outsourcing Cyber Risks"
SFScon17 - Luca Moroni: "Outsourcing Cyber Risks"
 
A model for reducing information security risks due to human error
A model for reducing information security risks due to human errorA model for reducing information security risks due to human error
A model for reducing information security risks due to human error
 
Cisco ccna security
Cisco ccna securityCisco ccna security
Cisco ccna security
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
 
pentesting-and-buzzwords
pentesting-and-buzzwordspentesting-and-buzzwords
pentesting-and-buzzwords
 
Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013
 
2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles Hamilton2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles Hamilton
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015
 
It risk assessment_methodology
It risk assessment_methodology It risk assessment_methodology
It risk assessment_methodology
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)
 
International Security Issues: 10 Recommendations from the 2010 Security Jam
International Security Issues: 10 Recommendations from the 2010 Security JamInternational Security Issues: 10 Recommendations from the 2010 Security Jam
International Security Issues: 10 Recommendations from the 2010 Security Jam
 

Andere mochten auch

PCI: A Valuable Security Framework, Not a Punishment
PCI: A Valuable Security Framework, Not a PunishmentPCI: A Valuable Security Framework, Not a Punishment
PCI: A Valuable Security Framework, Not a PunishmentTripwire
 
The State of Risk-Based Security Management
The State of Risk-Based Security ManagementThe State of Risk-Based Security Management
The State of Risk-Based Security ManagementTripwire
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanTripwire
 
PCI DSS 3.0: Don’t Shortchange Your PCI Readiness
PCI DSS 3.0: Don’t Shortchange Your PCI ReadinessPCI DSS 3.0: Don’t Shortchange Your PCI Readiness
PCI DSS 3.0: Don’t Shortchange Your PCI ReadinessTripwire
 
QSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistQSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistTripwire
 
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...Tripwire
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Andere mochten auch (8)

PCI: A Valuable Security Framework, Not a Punishment
PCI: A Valuable Security Framework, Not a PunishmentPCI: A Valuable Security Framework, Not a Punishment
PCI: A Valuable Security Framework, Not a Punishment
 
The State of Risk-Based Security Management
The State of Risk-Based Security ManagementThe State of Risk-Based Security Management
The State of Risk-Based Security Management
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
 
PCI DSS 3.0: Don’t Shortchange Your PCI Readiness
PCI DSS 3.0: Don’t Shortchange Your PCI ReadinessPCI DSS 3.0: Don’t Shortchange Your PCI Readiness
PCI DSS 3.0: Don’t Shortchange Your PCI Readiness
 
QSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistQSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & Checklist
 
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Ähnlich wie The Perils that PCI brings to Security

Security economics
Security economicsSecurity economics
Security economicsYansi Keim
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
Global Cyber Security Industry
Global Cyber Security IndustryGlobal Cyber Security Industry
Global Cyber Security IndustryReportLinker.com
 
Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Dinis Cruz
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
2013 PMA Business Security Insights
2013 PMA Business Security Insights2013 PMA Business Security Insights
2013 PMA Business Security Insightsgotopaz
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligenceguest08b1e6
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyie-Democracy Conference
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCapgemini
 

Ähnlich wie The Perils that PCI brings to Security (20)

Security economics
Security economicsSecurity economics
Security economics
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Global Cyber Security Industry
Global Cyber Security IndustryGlobal Cyber Security Industry
Global Cyber Security Industry
 
Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
2013 PMA Business Security Insights
2013 PMA Business Security Insights2013 PMA Business Security Insights
2013 PMA Business Security Insights
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Security analysis
Security analysisSecurity analysis
Security analysis
 
A6704d01
A6704d01A6704d01
A6704d01
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyi
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurity
 

Mehr von Tripwire

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughTripwire
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportTripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!Tripwire
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsTripwire
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 

Mehr von Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 

Kürzlich hochgeladen

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

The Perils that PCI brings to Security

  • 1. The Perils that PCI Brings to Security
  • 2. The Perils that PCI brings to Security
  • 4. The [Possible] Perils PCI Brings to Security Joshua Corman Research Director, Enterprise Security The 451 Group
  • 5. Who am I? Research Director for Enterprise Security, The 451 Group Joined The 451 Group on Oct 2009 ►12 years in Networking and Security – Former Principal Security Strategist [IBM ISS] – Sold stealth start-up vCIS to ISS in 2002 ►Industry Leadership – Expert Faculty - The Institute for Applied Network Security (IANS) – 2009 NetworkWorld Top 10 Tech People to Know – Co-Founder: “Rugged” www.ruggedsoftware.org ►Things I’ve been researching: − Compliance vs Security − Virtualization and Cloud Computing − The Economics of Security − Politically Motivated Cyber (APT/APA/SMT) 5 − Comprehensive Data Security
  • 6. Constant Change EVOLVING THREAT EVOLVING EVOLVING COMPLIANCE TECHNOLOGY COST COMPLEXITY RISK EVOLVING EVOLVING ECONOMICS BUSINESS 6
  • 8. Our Ecosystem ►Vendors: Infrastructure ►Vendors: Security Incumbents ►Vendors: Innovative Start-Ups ►The Investment Community ►The Carriers / Service Providers ►The Regulators ►The Adversaries ►The End-User Community ►Others... 8
  • 9. Our Ecosystem v0.1 Adversaries Big Vendors 9
  • 10. Our Ecosystem v0.1 Adversaries Big Vendors 10
  • 11. Our Ecosystem v0.1 Adversaries Big Vendors 11
  • 12. Our Ecosystem v0.1 Adversaries Big Vendors 12
  • 13. Our Ecosystem v0.1 Adversaries Big Vendors 13
  • 14. Our Ecosystem v0.1 Adversaries Regulatory Big Vendors 14
  • 15. Our Ecosystem v0.1 Adversaries Regulatory Big Vendors 15
  • 16. Our Ecosystem v0.1 Adversaries Regulatory Big Vendors 16
  • 18. Information Asymmetry Trust Abused 18
  • 19. Information Asymmetry Blindspots 19
  • 20. Information Asymmetry Compliance 20 Free Report: Security derivatives: the downward spiral caused by information asymmetry http://www.the451group.com/intake/securityderivatives/
  • 24. Beyond Compliance Adversaries Regulatory 24
  • 25. PCI’s Target PCI is not meant to protect *you*… …that is your job Intellectual Property Card Data / Productivity Systems Corporate Secrets Competitive Differentiation 25
  • 26. The Chosen Few… If we apply a “purchase and deploy” lens to PCI DSS 1.2, we can infer which security product categories are sure to get spending. The Winners: “Nine” security technologies specifically buoyed by PCI DSS 1. Firewall (FW) 2. Intrusion Detection Systems (IDS) – not even IPS. This can be NIDS or HIDS 3. Anti-Virus (AV) 4. Multi-Factor Auth 5. Encryption (Non-OS Native) 6. File Integrity Monitoring (FIM) – “like Tripwire” 7. Vulnerability Assessment/Management 8. *Log Management – not SIM or ESIM (*technically don’t need a product) 9. OPTIONAL: Web Application Firewall (WAF) or an SDLC 1. PCI Service: External scans by a certified ASV (Application Scanning Vendor) – Quarterly scans by a certified 3rd party (or after “major” changes) 2. PCI Service: The QSA Audit itself (annually ranging from $10,000 - $25,000) 26 3. If breached (which never happens) required to use a certified QIRA for Incident Response
  • 27. A mismatch… CLICK PLAY ►PCI Rocks YouTube Video: – http://www.youtube.com/watch?v=xpfCr4By71U 27 ►Is PCI the No Child Left Behind Act for Information Security?
  • 28. Change, Change, Change… ►Solve for all sources of change EVOLVING THREAT – Threat – Technology – Business – Economics EVOLVING EVOLVING COMPLIANCE TECHNOLOGY – Compliance COST COMPLEXITY RISK ►Assume Information Asymmetry – Seek new sources of Information – Distrust Legacy Wisdom EVOLVING EVOLVING ECONOMICS BUSINESS ►Planning for Agility – Think 3-5 years – Look for extensibility and roadmap 28
  • 29. How will you go beyond PCI? 29
  • 30. Related Reading* Security derivatives: the downward spiral caused by information asymmetryhttp://www.the451group.com:80/report_view/report_view.php?entity_i d=60884 The adversary: APTs and adaptive persistent adversarieshttp://www.the451group.com:80/report_view/report_view.php?entity_ id=62643 Like spinning plates: five sources of cost, complexity and risk in IT security – Part 1 http://www.the451group.com:80/report_view/report_view.php?entity_id=62198 Security Quarterly: E-Crime and Advanced Persistent Threats: How Profit and Politics Affect IT Security Strategies http://www.the451group.com/security/security_detail.php?icid=1060 30 * We will happily provide trial access for participants of this Webinar
  • 31. Joshua Corman Research Director, Enterprise Security The 451 Group jcorman@the451group.com twitter @joshcorman
  • 32. Increased Security through Constant Compliance
  • 34. Problem: Taking Too Long to Find Breaches/Risks Breaches go undiscovered and uncontained for weeks or months in 75 % of cases. 2009 Breach Average time between a breach and the detection of Discovery it: 156 days [5.2 months] Feb. 2010 “…breaches targeting stored data averaged 686 days [of exposure]” 2010 “More than 75,000 computers … hacked” -- The attack began late 2008 and discovered last month Feb. 2010
  • 35. Result: The Time Delay Of Discovery Is Costly! Breach Discovery “The average cost per breach in 2009 was $6.7 million…” Ponemon Institute, Jan. 25, 2010
  • 36. Result: The Time Delay Of Discovery Is Costly! Breach Discovery “Heartland Payment Systems announced today that it will pay “The average cost per breach in Visa-branded credit and debit 2009 was $6.7 million…” card issuers 25, 2010 $60 million…” Ponemon Institute, Jan. up to Bank Info Security, Jan. 8, 2010
  • 37. Over Ten Years, We Benchmarked 1500+ IT Orgs
  • 38. Higher Performing IT Organizations Are More Stable, Nimble, Compliant And Secure  • Fewest • One-third  • 5 times • 5 times  • 14 times more • One-half • One-quarter • 10x faster  • One-third • 8 times more • 6 times more Source: IT Process Institute, May 2008
  • 39. Visible Ops: Playbook of High Performers • • • www.ITPI.org
  • 40. 2007: Three Controls Predict 60% Of Performance • Standardized configuration strategy • Process discipline • Controlled access to production systems Source: IT Process Institute, May 2006
  • 41. Need: Close The Time Gap Many Compromising Problems Are Difficult To Discover Logging turned off FTP event to foreign IP New user added Login successful FTP enabled 10 failed logins DLL modified by new user
  • 42. Just Detecting Change Is Not Enough… Policy-Based Intelligence Is Required Logging turned off New user added Typical FIM cannot make these types alerts. Change intelligence is required. FTP enabled DLL modified by new user
  • 43. Just Detecting Log Events Is Not Enough… Policy-Based Intelligence Is Required FTP event to foreign IP Login successful Log management alone cannot alert 10 failed logins on these events—SIEM is required.
  • 44. Relating Change Events to Log Events… Best Chance To Discover Compromising Problems Quickly Logging turned off FTP event to foreign IP Events New user added of Login successful Interest FTP enabled 10 failed logins DLL modified by new user
  • 45. Solution: Intelligent Threat Control Tripwire VIATM VISIBILITY  INTELLIGENCE  AUTOMATION Security File Integrity Monitoring Event Manager Compliance Policy Log Manager Manager Tripwire Enterprise Tripwire Log Center
  • 46. Answers For Your Questions

Hinweis der Redaktion

  1. Many organizations have file integrity monitoring, log management and even event management solutions in place.But the average time it takes these same organizations to discover that a breach has occurred is months.During that time their critical data and infrastructure is at risk of compromise—if it has not already been compromised.There is an industry-wide problem: The time it takes to discover breaches is far too long and it needs to be shortened.
  2. The cost of this time delay is enormous.These organizations not only suffer monetarily, their “mojo” is also badly damaged.They loose shareholder trust and value.Their name remains in the press and presentation like this for a very long time.
  3. The cost of this time delay is enormous.These organizations not only suffer monetarily, their “mojo” is also badly damaged.They loose shareholder trust and value.Their name remains in the press and presentation like this for a very long time.
  4. Tripwire VIA delivers intelligent threat control by providing…Visibility across your infrastructure to know what is happening at all times.Intelligence to know which changes or events are suspect and may put your infrastructure and data at risk of compromise.Automation to help you to categorize high risk changes and events, remediate certain conditions, and automate compliance requirements such as reporting.