0
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
The Perils that PCI brings to Security
Upcoming SlideShare
Loading in...5
×

The Perils that PCI brings to Security

555

Published on

Josh Corman, Research Director, Enterprise Security Practice, is often known for his deep insights into and candid discussions about the state of enterprise security and the variables and trends that impact it. Listen as Josh discusses how and why PCI compliance has affected the state of security-specifically, the impact of approaching PCI as a checklist. He also gives ideas for what we need to do, and the types of solutions we need to have to not only satisfy the PCI audit, but to also provide real system security. Josh discusses this in an informal back and forth format with Gene Kim, Tripwire co-Founder and CTO.

In this webcast, you'll learn:

How compliance introduced cost complexity by causing a divergence between what we need to do to pass an audit versus avert threats.

The fallacy that being PCI compliance means you're secure.

Controls that both help you pass your PCI audit while also deterring advanced threats.

How Tripwire VIA solutions provide that rare combination of controls that address both compliance and security.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
555
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Many organizations have file integrity monitoring, log management and even event management solutions in place.But the average time it takes these same organizations to discover that a breach has occurred is months.During that time their critical data and infrastructure is at risk of compromise—if it has not already been compromised.There is an industry-wide problem: The time it takes to discover breaches is far too long and it needs to be shortened.
  • The cost of this time delay is enormous.These organizations not only suffer monetarily, their “mojo” is also badly damaged.They loose shareholder trust and value.Their name remains in the press and presentation like this for a very long time.
  • The cost of this time delay is enormous.These organizations not only suffer monetarily, their “mojo” is also badly damaged.They loose shareholder trust and value.Their name remains in the press and presentation like this for a very long time.
  • Tripwire VIA delivers intelligent threat control by providing…Visibility across your infrastructure to know what is happening at all times.Intelligence to know which changes or events are suspect and may put your infrastructure and data at risk of compromise.Automation to help you to categorize high risk changes and events, remediate certain conditions, and automate compliance requirements such as reporting.
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×