SlideShare a Scribd company logo
1 of 8
Case Study: Data Protection and PCI-
DSS Compliance for Multinational Bank
Financial Services Customer Success Story
Background:
A multinational banking and financial services company, with over 50,000 employees
worldwide, was subject to a wide range of regulatory requirements. In addition to
Sarbanes-Oxley (SOX), Graham, Leach, Bliley (GLB), and Payment Card Industry (PCI)
standards in the US, they were subject to international regulations such as the EU Data
Protection Directive. While the requirements for each standard vary, all focus on
protecting information. The frequent news regarding data breaches and stolen credit
card information made it clear that security had to be a priority.
When this organization decided it needed to improve protection of its credit card
customers’ data, it called Digital Guardian (DG).
Banking and Financial Services Case Study
 Company: Multinational Bank
 Challenge
• 50 million credit card customers around the
world
• Needed to permit some employees access to
social security numbers, others to access to
PANs only, while still protecting customer
information
• Needed to improve controls over removable
storage devices
Banking and Financial Services Case Study
Critical Success Factors
• PCI-DSS compliance
• Automatic identification and classification of
sensitive data
• Protection of all critical data on network file
servers
• Mask some data, while leaving other data
visible
• Allow administrators to back up files
containing sensitive data such as PAN and
social security numbers, but not decrypt them
4
Banking and Financial Services Case Study
Environment
• 12,000 Windows workstations
Solution
• Used Digital Guardian automatic classification to identify social security
numbers, PAN, and other personal information
• Digital Guardian endpoint agents monitored all user actions and enforced
controls, including:
• Automatically encrypt sensitive files when those files are moved to network file servers
• Prevent decryption of PCI PAN and/or SSN data by unauthorized users
• Automatically encrypt all sensitive data written from workstations to authorized removable
removable storage devices
Banking and Financial Services Case Study
Results
Contextual and content-based
classification of all sensitive data
Visibility into location and use of all PCI
regulated information
Compliance with PCI requirements for PAN
PAN encryption based on data usage
Removable device control with automatic
encryption on non-company devices
6
About Digital Guardian
Digital Guardian Facts
 Over 250 customers 130 of the Global 2000 and government agencies
 Over 2,100,000 endpoints protected
 130 of the Global 2000 and government agencies
 Used by 7 of the top 10 patent holders
 Only solution to scale to 250,000 agents
 Deployment Models Available:
• Managed Security Program (MSP)
• On Premise
• Hybrid MSP
7
At Digital Guardian, we believe your data is your business. We are the only patented data protection platform
trusted by millions of endpoints to secure against insider and outsider threats!
Want More Information?
8
http://bit.ly/InsiderThreatsRiskWP
Get the best tips on protecting your data by Dan Geer
by signing up to our whitepaper “How to Mitigate the
Risk of Insider Threats”
Join the conversation!

More Related Content

Viewers also liked

The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Introduction To Multinational Banking
Introduction To Multinational BankingIntroduction To Multinational Banking
Introduction To Multinational Bankingtejinderubs
 
Management des risques ibtissam el hassani-chapitre1-2
Management des risques   ibtissam el hassani-chapitre1-2Management des risques   ibtissam el hassani-chapitre1-2
Management des risques ibtissam el hassani-chapitre1-2ibtissam el hassani
 
Management des risques 10 : Aspect Réglementaire et Normatif
Management des risques 10 : Aspect Réglementaire et Normatif Management des risques 10 : Aspect Réglementaire et Normatif
Management des risques 10 : Aspect Réglementaire et Normatif ibtissam el hassani
 
International banking
  International banking  International banking
International bankingnileshsen
 
Management des risques 9 : Risques d’Entreprise et Cartographie
Management des risques 9 : Risques d’Entreprise et CartographieManagement des risques 9 : Risques d’Entreprise et Cartographie
Management des risques 9 : Risques d’Entreprise et Cartographieibtissam el hassani
 
[Gestion des risques et conformite] mettre en place une demarche erm
[Gestion des risques et conformite] mettre en place une demarche erm[Gestion des risques et conformite] mettre en place une demarche erm
[Gestion des risques et conformite] mettre en place une demarche ermonepoint x weave
 

Viewers also liked (8)

The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Introduction To Multinational Banking
Introduction To Multinational BankingIntroduction To Multinational Banking
Introduction To Multinational Banking
 
Management des risques ibtissam el hassani-chapitre1-2
Management des risques   ibtissam el hassani-chapitre1-2Management des risques   ibtissam el hassani-chapitre1-2
Management des risques ibtissam el hassani-chapitre1-2
 
Management des risques 10 : Aspect Réglementaire et Normatif
Management des risques 10 : Aspect Réglementaire et Normatif Management des risques 10 : Aspect Réglementaire et Normatif
Management des risques 10 : Aspect Réglementaire et Normatif
 
International banking
  International banking  International banking
International banking
 
Management des risques 9 : Risques d’Entreprise et Cartographie
Management des risques 9 : Risques d’Entreprise et CartographieManagement des risques 9 : Risques d’Entreprise et Cartographie
Management des risques 9 : Risques d’Entreprise et Cartographie
 
Processus Audit SI
Processus Audit SIProcessus Audit SI
Processus Audit SI
 
[Gestion des risques et conformite] mettre en place une demarche erm
[Gestion des risques et conformite] mettre en place une demarche erm[Gestion des risques et conformite] mettre en place une demarche erm
[Gestion des risques et conformite] mettre en place une demarche erm
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Case Study: Data Protection and PCI-DSS Compliance for Multinational Bank

  • 1. Case Study: Data Protection and PCI- DSS Compliance for Multinational Bank Financial Services Customer Success Story
  • 2. Background: A multinational banking and financial services company, with over 50,000 employees worldwide, was subject to a wide range of regulatory requirements. In addition to Sarbanes-Oxley (SOX), Graham, Leach, Bliley (GLB), and Payment Card Industry (PCI) standards in the US, they were subject to international regulations such as the EU Data Protection Directive. While the requirements for each standard vary, all focus on protecting information. The frequent news regarding data breaches and stolen credit card information made it clear that security had to be a priority. When this organization decided it needed to improve protection of its credit card customers’ data, it called Digital Guardian (DG).
  • 3. Banking and Financial Services Case Study  Company: Multinational Bank  Challenge • 50 million credit card customers around the world • Needed to permit some employees access to social security numbers, others to access to PANs only, while still protecting customer information • Needed to improve controls over removable storage devices
  • 4. Banking and Financial Services Case Study Critical Success Factors • PCI-DSS compliance • Automatic identification and classification of sensitive data • Protection of all critical data on network file servers • Mask some data, while leaving other data visible • Allow administrators to back up files containing sensitive data such as PAN and social security numbers, but not decrypt them 4
  • 5. Banking and Financial Services Case Study Environment • 12,000 Windows workstations Solution • Used Digital Guardian automatic classification to identify social security numbers, PAN, and other personal information • Digital Guardian endpoint agents monitored all user actions and enforced controls, including: • Automatically encrypt sensitive files when those files are moved to network file servers • Prevent decryption of PCI PAN and/or SSN data by unauthorized users • Automatically encrypt all sensitive data written from workstations to authorized removable removable storage devices
  • 6. Banking and Financial Services Case Study Results Contextual and content-based classification of all sensitive data Visibility into location and use of all PCI regulated information Compliance with PCI requirements for PAN PAN encryption based on data usage Removable device control with automatic encryption on non-company devices 6
  • 7. About Digital Guardian Digital Guardian Facts  Over 250 customers 130 of the Global 2000 and government agencies  Over 2,100,000 endpoints protected  130 of the Global 2000 and government agencies  Used by 7 of the top 10 patent holders  Only solution to scale to 250,000 agents  Deployment Models Available: • Managed Security Program (MSP) • On Premise • Hybrid MSP 7 At Digital Guardian, we believe your data is your business. We are the only patented data protection platform trusted by millions of endpoints to secure against insider and outsider threats!
  • 8. Want More Information? 8 http://bit.ly/InsiderThreatsRiskWP Get the best tips on protecting your data by Dan Geer by signing up to our whitepaper “How to Mitigate the Risk of Insider Threats” Join the conversation!