SlideShare for iOS
by Linkedin Corporation
FREE - On the App Store
Every company who stores, processes, or transmits cardholder data needs to follow the rigid (but common sense) security requirements defined by the Payment Card Industry Data Security Standards. ...
Every company who stores, processes, or transmits cardholder data needs to follow the rigid (but common sense) security requirements defined by the Payment Card Industry Data Security Standards. Given the impressive/staggering/imposing costs associated with a data breach, the card brands have solid incentive to make sure the standards are being followed as well as to learn all they can about the threat landscape to keep the standards current and comprehensive. When the card brands identify a company as being the Common Point of Purchase on a set of fraudulently used cards, that company is generally required to obtain a detailed forensic investigation by a PFI agency to uncover the source of the breach. If your company were to ever experience such a breach, this talk should give you some idea of what to expect throughout the investigation process.
The goal is to educate an audience of company stakeholders, IT security professionals, and diverse forensic investigators as to the methodologies of PFI companies and what they look for when investigating compromised cardholder data. The presentation starts with a general overview of the PCI landscape and Data Security Standards and then moves quickly into detailing what a breached entity is likely to experience during a forensic investigation. From there, the talk details initial threat landscape, on-site arrival, collection and investigation, and detailed scientific analysis back at the lab. Finally, it discusses practical ways a company can reduce risk and scope, improve their overall security posture, and hopefully prevent the need to undergo such an investigation in the first place.