SlideShare a Scribd company logo
1 of 20
You Never Know Who Is Listening:  Securing Call Center Recordings &  Personally Identifiable Information (PII)
Agenda ,[object Object],[object Object],[object Object]
What  threats  exist today that jeopardize the security of call center recordings Ginney McAdams Vice President of Business Development TantaComm
2008 Data Breaches Soar ITRC Reports 47% Increase over 2007  According to ITRC reports, only 2.4% of all breaches had encryption or other strong protection methods in use.  Posted 1/5/09 on idthreatcenter.org 2008 - # of Breaches 2008 2007 2006 Business 240 36.6% 28.9% 21% Educational 131 20% 24.8% 28% Government/Military 110 16.8% 24.6% 30%
2008 Data Breaches Soar ITRC Reports 47% Increase over 2007  For 2008 Financial Business Education Gvt/Military Medical Insider Theft 2.4% 5.6% 1.8% 3.4% 2.4% Hacking 3.5% 6.1% 2.7% 0.8% 0.8% Data on the Move 1.7% 7.3% 3% 4.3% 4.4%
Threats that Exist today ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Best practice  strategies  for taking an encryption approach to security and compliance Trisha Paine Board of Directors PCI Security Alliance
Sustainable Compliance Objectives and Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Objectives Requirements
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Issues Solutions Sustainable Compliance Factors and Challenges
Sustainable Compliance  Resulting Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* Based on  an analysis by C&H that compared audit effort using traditional controls, against audit effort using SafeNet EDP components
Assess risks    Classify critical assets based on business impact    Perform on-going Risk Assessments to identify threats and vulnerabilities    Implement controls based on policy and standards Monitor and adjust controls    Perform ongoing monitoring of controls    Analyze and mitigate threats    Identify and correct vulnerabilities    Adjust controls based on changing business needs Communicate     Provide reports and metrics to key stakeholders    Verify and validate controls are in place and performing Best Practices Bottom Line
Technologies  that offset threats and meet compliance by securing call center recordings and PII  Ginney McAdams Vice President of Business Development TantaComm
Securing your Recordings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Securing your Recordings
Securing your Recordings ,[object Object]
Technologies  that offset threats and meet compliance by securing call center recordings and PII  Andrew Dillon Director of Product Management SafeNet, Inc.
DataSecure and Enterprise Data Protection An Integrated Suite of Data-Centric Security Solutions  to Protect Data and Achieve Compliance Remote Location   Data Center Databases SafeNet DataSecure Mainframe SafeNet ProtectDrive SafeNet ProtectFile SafeNet Authentication SafeNet ProtectDB SafeNet  DataSecure  Toolkit SafeNet  DataSecure  Toolkit SafeNet EdgeSecure File Servers Application and Web Servers SafeNet ProtectFile Laptop/Mobile Handset
Why DataSecure? Secure    Hardware-based, centralized key and policy management     FIPS/CC certified    Granular access privileges and separation of duties Fast    High performance encryption offload, over 100k TPS    Batch processing for massive amounts of data Flexible    Support for heterogeneous environments (app, db, file)     Support for open standards and APIs Simple    Intuitive administration     Centralized policy creation and enforcement    Granular logging/auditing
Questions?
Thank You Trisha Paine PCI Security Alliance [email_address] For more information: Ginney McAdams Vice President, TantaComm [email_address] Andrew Dillon Product Manager, SafeNet [email_address]

More Related Content

What's hot

Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139
evaleng2
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
Manish Dixit Ceh
 

What's hot (20)

Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?
 
Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
SIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security FrameworkSIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security Framework
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
 
Achieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceAchieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 Compliance
 
CMMC Certification
CMMC CertificationCMMC Certification
CMMC Certification
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
 
QSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistQSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & Checklist
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
Cyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS NetworkCyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS Network
 
Integrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyIntegrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to Many
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
 
SIEM Alone is Not Enough
SIEM Alone is Not EnoughSIEM Alone is Not Enough
SIEM Alone is Not Enough
 

Viewers also liked

Viewers also liked (6)

Au pairordningen - rettigheter, muligheter og plikter
Au pairordningen - rettigheter, muligheter og plikterAu pairordningen - rettigheter, muligheter og plikter
Au pairordningen - rettigheter, muligheter og plikter
 
NyLov EØS EFTA Borgere
NyLov EØS EFTA BorgereNyLov EØS EFTA Borgere
NyLov EØS EFTA Borgere
 
Migrasjon Til Norge
Migrasjon Til NorgeMigrasjon Til Norge
Migrasjon Til Norge
 
Dealer- Jordan Mays
Dealer- Jordan MaysDealer- Jordan Mays
Dealer- Jordan Mays
 
Turning Insight Into Action With Cics Events
Turning Insight Into Action With Cics EventsTurning Insight Into Action With Cics Events
Turning Insight Into Action With Cics Events
 
R Dz7.5 Overview
R Dz7.5 OverviewR Dz7.5 Overview
R Dz7.5 Overview
 

Similar to Securing Call Center Recordings Webinar 4 16 09

Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
KGanzy
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
SafeNet
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
Vincent Kwon
 

Similar to Securing Call Center Recordings Webinar 4 16 09 (20)

Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
DLP
DLPDLP
DLP
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 

Securing Call Center Recordings Webinar 4 16 09

  • 1. You Never Know Who Is Listening: Securing Call Center Recordings & Personally Identifiable Information (PII)
  • 2.
  • 3. What threats exist today that jeopardize the security of call center recordings Ginney McAdams Vice President of Business Development TantaComm
  • 4. 2008 Data Breaches Soar ITRC Reports 47% Increase over 2007 According to ITRC reports, only 2.4% of all breaches had encryption or other strong protection methods in use. Posted 1/5/09 on idthreatcenter.org 2008 - # of Breaches 2008 2007 2006 Business 240 36.6% 28.9% 21% Educational 131 20% 24.8% 28% Government/Military 110 16.8% 24.6% 30%
  • 5. 2008 Data Breaches Soar ITRC Reports 47% Increase over 2007 For 2008 Financial Business Education Gvt/Military Medical Insider Theft 2.4% 5.6% 1.8% 3.4% 2.4% Hacking 3.5% 6.1% 2.7% 0.8% 0.8% Data on the Move 1.7% 7.3% 3% 4.3% 4.4%
  • 6.
  • 7. Best practice strategies for taking an encryption approach to security and compliance Trisha Paine Board of Directors PCI Security Alliance
  • 8.
  • 9.
  • 10.
  • 11. Assess risks  Classify critical assets based on business impact  Perform on-going Risk Assessments to identify threats and vulnerabilities  Implement controls based on policy and standards Monitor and adjust controls  Perform ongoing monitoring of controls  Analyze and mitigate threats  Identify and correct vulnerabilities  Adjust controls based on changing business needs Communicate  Provide reports and metrics to key stakeholders  Verify and validate controls are in place and performing Best Practices Bottom Line
  • 12. Technologies that offset threats and meet compliance by securing call center recordings and PII Ginney McAdams Vice President of Business Development TantaComm
  • 13.
  • 15.
  • 16. Technologies that offset threats and meet compliance by securing call center recordings and PII Andrew Dillon Director of Product Management SafeNet, Inc.
  • 17. DataSecure and Enterprise Data Protection An Integrated Suite of Data-Centric Security Solutions to Protect Data and Achieve Compliance Remote Location Data Center Databases SafeNet DataSecure Mainframe SafeNet ProtectDrive SafeNet ProtectFile SafeNet Authentication SafeNet ProtectDB SafeNet DataSecure Toolkit SafeNet DataSecure Toolkit SafeNet EdgeSecure File Servers Application and Web Servers SafeNet ProtectFile Laptop/Mobile Handset
  • 18. Why DataSecure? Secure  Hardware-based, centralized key and policy management  FIPS/CC certified  Granular access privileges and separation of duties Fast  High performance encryption offload, over 100k TPS  Batch processing for massive amounts of data Flexible  Support for heterogeneous environments (app, db, file)  Support for open standards and APIs Simple  Intuitive administration  Centralized policy creation and enforcement  Granular logging/auditing
  • 20. Thank You Trisha Paine PCI Security Alliance [email_address] For more information: Ginney McAdams Vice President, TantaComm [email_address] Andrew Dillon Product Manager, SafeNet [email_address]