SlideShare a Scribd company logo
1 of 43
Sleeping With The Enemy:  Better Living Through Hacking Compliance  (budgets) Or Navigating the Corridors of the  Compliance Industrial Complex January, 2010
In a nutshell Compliance != Security A selection of frothy rants about PCI in particular, then “But Nick? What can I, a mere infosec professional, do?”; A New and Improved Way to Articulate Risk; Scattered throughout: Propaganda, crypto-advertising for TRM (when you engage TRM as a consultant, you and your boss become measurably more attractive to the opposite sex.)
Compliance != Security Compliance == Compliance Are you  {compliant|secure}  like this guy is {compliant|secure} ?
Compliance & DLP What the hell does a rant about compliance have to do with DLP?  Well, if you’re like most infosec professionals,  You’re tasked with reducing data loss; and You’re tasked with increasing compliance tasks and reducing audit dings for, you know, everything I aver these goals are in conflict
DLP is not a Technology Issue  Ironically, this is being presented at a conference called, WhatWorks in DLP  Note, ladies and gentlemen, the Red Square of Death. Image: The 451 Group, Mind The Data Gap, June 2008, http://www.the451group.com
Why Rulesets Exist Ruleset writers aren’t evil, but they are reactive SOX, HIPAA, PCI – all were in response to a specific problem All attempt to raise the level of overall “security” How they do so is the problem Some rulesets are less cynical than others
PCI on PCI “The PCI Security Standards Council’s mission is to enhance payment account data security by driving education and awareness of the PCI Security Standards. The organization was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide, and Visa, Inc.”
“Not worthless.” “I do not believe the PCI Standards are worthless; in the absence of other requirements, they do serve some purpose. But I do want to dispel the myth once and for all that PCI compliance is enough to keep a company secure. It is not, and the credit card companies acknowledge that.” -Rep. Yvette D Clarke (D-N.Y.) chairwoman of the Subcommittee On Emerging Threats, Cybersecurity and Science and Technology,  Committee on Homeland Security
The PCI Dilemma PCI says it wants to, “Raise the bar” by setting forth some highly specific tasks and standards.  Unfortunately they were specific to a paradigm gone by, and those who don’t comply get fined and hassled For offloading risk from card brands, PCI has raised the bar. For data security, not only has PCI not, “raised the floor,” in fact it’s substantially lowered the ceiling Because it is expensive in terms of money and resources, PCI is not the minimum standard, it’s the maximum effort that many organizations make.
Why Compliance is InfoSec’s Problem As punishment for making everything so complicated, information security professionals have been saddled with compliance management.
OK, here’s really why…	 Enron. Yelling.  SOX. “Oh, crap – who’s going to deal with this? Hey! Information Security!”
The CEO should do better The CEO who lets the Security organization become the compliance department has abdicated to the government and Payment Card Industry his responsibility to understand and manage organizational risk.  That is a fiduciary breach of his responsibility to shareholders. In addition to firing his ass, this should also be a floggable offense.
Here’s why present-day implementations of PCI are not just not good for security, but why they’re antithetical to good security.
Setting The Bar … at 1984 We’re in an Orwellian IT universe, and criminals are Big Brother  They have better configuration management data on us than our own information security groups.  They know exactly what we’re doing because PCI tells them what we’re doing. They have rapidly evolving and advanced persistent threats, new generations of attack tools and a wildly changed attack paradigm We have anti-virus and IDS/IPS and firewalls
When Rules & Taxes Matter When government wishes to discourage behavior, they have options: They can shunt it off to someone else (“Faith Based Community Initiatives,” etc They can tax it They can legislate it Taxes and legislation clearly discourage behaviors…
Smoking in New York City March, 2003: Smoking banned at NYC restaurants, bars, nightclubs
Smoking deaths in NYC
Teen Smoking Rates in NYC * no data available for 2007
Now, let’s look at how well PCI has worked to prevent loss of PII
Records Lost…. 2006: PCI 1.1 PCI 1.0 2008: PCI 1.2
Records Lost…. SEPT 2006: PCI 1.1 DEC 2004: PCI 1.0 OCT 2008: PCI 1.2
Records Lost Per Breach
An opposing view
A retort “From all accounts it appears that many of the murders and drug-smuggling operations can be attributed to the Mafia. What would the world look like if we ignored their crimes when measuring the success of policing efforts?”
Statistics Manipulation Of course, I’m being intellectually dishonest with my statistics on PCI.  In the slides about smoking we deal with known and proved risks and threats.  The PCI council behaves as if it is too, but security is a dynamic, transactional environment comprising constantly evolving technology. PCI makes specific statements about security which are suspect at any point in time let alone in a continuum, and pretends it’s delivering consistent effect against a static equation.  Logicians call this behavior, “Stupid.”  Okay, they call it “Confounded thinking.”
The Trouble With PCI SOX, HIPAA, etc made their goals clear and the means vague. This caused confusion, but the market sorted it out.  PCI is a compilation of a hunches on how to prevent breaches: the specific means to the desired end (that is, to offload risk onto merchants).  How about not confusing the means and end? Just punish the failure to secure data, and let the free market figure out how best to prevent breaches.
PCI is a Protection Racket by a Cabal. Ponemon 2009 PCI DSS Compliance Study: 71% of companies don’t treat PCI as a strategic initiative  79% have experienced a data breach 56% don’t believe PCI compliance improves their data security posture 60 % say they can’t achieve PCI compliance Recent studies say 30% of the IT security budget is spent on PCI compliance Let’s call it 20%. TWENTY PERCENT. Plus, when you’re breached, you got your fines and your publicity hit. That’s a regressive, unofficial tax for which we get back nothing. And the card brands get to offload risk onto merchants.
If we’re gonna tax, let’s tax… D’OH!TAX Fun Fact: This tax will hit many banks! D’OH!TAX THE a. $1,000 per record breached; b. Raises $250,000,000,000 for deficit reduction – WHAT bailout?; c. Replaces all PCI requirements; d. All other fines & reporting requirements still apply
While I’m in Fantasy Land… I also want a pony.
What is to be done?
First of all… Join the rebel alliance. Don’t let a dismal failure be held up as a success: Loose lips sink ships - let’s sink one:  be vocal about PCI failures and how they affect your job, your happiness and your effectiveness as an info-security pro. Because if you don’t speak up, other rule-writers will hold up PCI as the model of how this stuff should be done.
Be Constructive Rather than berate something which isn’t going away, let’s work to change these arbitrarily objective compliance overviews like PCI into subjective risk analysis tools. Let’s be wiser about how we look at PCI and use it as a lever to free up budget funds for things that we, as security professionals, believe will positively impact the bottom line.
Then… Reduce the suck. Work the system as best you can. Question – loudly – things that seem like window-dressing. Ask, “What is the intent of this?”  Use compliance requirements to justify spending on sensible things, like greatly expanding pen testing, or setting up an incident response workbench.
Compensating Controls If you are not engaged deeply with your QSA in substantive conversations regarding compensating controls, you either don’t care, or:   You don’t understand your environment;  You don’t understand the requirements; and  You are wasting lots of money on PCI.  You pay those people.  Make them work for you.
Let’s Get Back To Basics
“If you can’t measure, you can’t improve.”  Well, yeah, but… Right now, we’re counting things that help the vendors sell us stuff. Not only do we count these things, we let vendors tell us how important one is relative to another! It’s fine to count things, but if you’re counting the things that matter to the vendors, not to your business, you’re not doing yourself any favors According to this, everything’s getting better! Awesome!
Every business is different	 A fashion house can’t tell a media firm what’s important; hell, one media firm can’t tell another what’s important. This is not just cross industry – it’s true in the same company three months later!  Each pen tester, each auditor will have different results even in the same company
This is so not news Andy Jaquith, Dan Geer, Betsy Nichols, et al have been talking about this for a wicked-long time. Yet in conversations around the country, the counting thing is still mainly based on : ,[object Object]
Vulns – and the relative terror thereof,[object Object]
Articulating Risk How do you articulate risk?  Doctors listen most to mom’s statements like, “Something’s just not right.” Say to your CIO, “This feels icky” How Icky? On a scale of 1 to eeew! Eeeeeeew A little
An Example PCI 12.2 talks about internal and external pen testing teams.  There is great bang-for-buck setting up internal pen-testing team: To talk to pen testers To test patches, controls To enumerate hosts, processes, workflows To understand your environment To understand and positively affect config management
Pick Your Battles Find out what you care about Attach your team to revenue producing projects Use PCI and compliance as a lever the budget Speak in terms of risk, not threat Count metrics that speak in dollars and time Yell when compliance makes you do something dumb or hate your job
Questions? Contact us: Nick Selby, Managing Director nick.selby [ at] tridentrm.com Paul Davis, Chief Security Officer paul.davis[at ]tridentrm.com Clint Bruce, Chairman c.Bruce (at ) trg-ltd.com

More Related Content

What's hot

2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guideJames Fisher
 
Achieving Regulatory Compliance The Devil Is In The Data Governance V2
Achieving Regulatory Compliance   The Devil Is In The Data Governance V2Achieving Regulatory Compliance   The Devil Is In The Data Governance V2
Achieving Regulatory Compliance The Devil Is In The Data Governance V2Ken O'Connor
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersThe Lorenzi Group
 
Netflix SIRT - Culture and Tech -Trainman
Netflix SIRT - Culture and Tech -TrainmanNetflix SIRT - Culture and Tech -Trainman
Netflix SIRT - Culture and Tech -TrainmanAlex Maestretti
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Peter Bihr
 
Snia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaSnia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaPeter Mojica
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley
 
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Mike Davis
 
Dr. jeanne ross interview health check
Dr. jeanne ross interview  health checkDr. jeanne ross interview  health check
Dr. jeanne ross interview health checkComputer Aid, Inc
 
The other world of it
The other world of itThe other world of it
The other world of itFing
 
Defensible rim disposal leads to effective discovery responses - 2011.08.09
Defensible rim disposal leads to effective discovery responses - 2011.08.09Defensible rim disposal leads to effective discovery responses - 2011.08.09
Defensible rim disposal leads to effective discovery responses - 2011.08.09Alfresco Software
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyAIIM International
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Shawn Tuma
 
Adding Value with Business Intelligence
Adding Value with Business IntelligenceAdding Value with Business Intelligence
Adding Value with Business IntelligenceBirlasoft India
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...Daniel Katz
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...Shawn Tuma
 

What's hot (20)

2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide
 
Ey Lets Talk Sustainability (August 2016)
Ey Lets Talk Sustainability (August 2016)Ey Lets Talk Sustainability (August 2016)
Ey Lets Talk Sustainability (August 2016)
 
Achieving Regulatory Compliance The Devil Is In The Data Governance V2
Achieving Regulatory Compliance   The Devil Is In The Data Governance V2Achieving Regulatory Compliance   The Devil Is In The Data Governance V2
Achieving Regulatory Compliance The Devil Is In The Data Governance V2
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
Netflix SIRT - Culture and Tech -Trainman
Netflix SIRT - Culture and Tech -TrainmanNetflix SIRT - Culture and Tech -Trainman
Netflix SIRT - Culture and Tech -Trainman
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)
 
Snia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaSnia Eiw2007 Peter Mojica
Snia Eiw2007 Peter Mojica
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
 
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)
 
Dr. jeanne ross interview health check
Dr. jeanne ross interview  health checkDr. jeanne ross interview  health check
Dr. jeanne ross interview health check
 
The other world of it
The other world of itThe other world of it
The other world of it
 
Defensible rim disposal leads to effective discovery responses - 2011.08.09
Defensible rim disposal leads to effective discovery responses - 2011.08.09Defensible rim disposal leads to effective discovery responses - 2011.08.09
Defensible rim disposal leads to effective discovery responses - 2011.08.09
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
 
Adding Value with Business Intelligence
Adding Value with Business IntelligenceAdding Value with Business Intelligence
Adding Value with Business Intelligence
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 

Viewers also liked

Brendan Wenzel Design&Animation
Brendan Wenzel Design&AnimationBrendan Wenzel Design&Animation
Brendan Wenzel Design&AnimationBrendanwenzel
 
台灣熱血單車環島 2010
台灣熱血單車環島 2010台灣熱血單車環島 2010
台灣熱血單車環島 2010Angus C
 
Deranged Script
Deranged ScriptDeranged Script
Deranged ScriptTeesha29
 
2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near Buffalo
2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near Buffalo2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near Buffalo
2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near BuffaloWest Herr Subaru
 
materi pajak
materi pajakmateri pajak
materi pajakshutrwin
 
'Deranged' Feedback
'Deranged' Feedback'Deranged' Feedback
'Deranged' FeedbackTeesha29
 
AS Media Questionnaire Evaluation
AS Media Questionnaire EvaluationAS Media Questionnaire Evaluation
AS Media Questionnaire EvaluationTeesha29
 
Philof21centurylearning
Philof21centurylearningPhilof21centurylearning
Philof21centurylearningsielynn
 
Tutorial menyecan dengan ac dsee
Tutorial menyecan dengan ac dseeTutorial menyecan dengan ac dsee
Tutorial menyecan dengan ac dseeshutrwin
 
Storyboard For Preliminary Excercise
Storyboard For Preliminary ExcerciseStoryboard For Preliminary Excercise
Storyboard For Preliminary ExcerciseTeesha29
 
2010 Subaru Tribeca Buffalo
2010 Subaru Tribeca Buffalo2010 Subaru Tribeca Buffalo
2010 Subaru Tribeca BuffaloWest Herr Subaru
 
Psa science tech idol ii update 3
Psa science tech idol ii update 3Psa science tech idol ii update 3
Psa science tech idol ii update 3shutrwin
 
Weizmann Uk Annual Accounts Final
Weizmann Uk Annual Accounts FinalWeizmann Uk Annual Accounts Final
Weizmann Uk Annual Accounts Finalguest7c6a7fb
 

Viewers also liked (14)

Brendan Wenzel Design&Animation
Brendan Wenzel Design&AnimationBrendan Wenzel Design&Animation
Brendan Wenzel Design&Animation
 
台灣熱血單車環島 2010
台灣熱血單車環島 2010台灣熱血單車環島 2010
台灣熱血單車環島 2010
 
Deranged Script
Deranged ScriptDeranged Script
Deranged Script
 
2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near Buffalo
2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near Buffalo2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near Buffalo
2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near Buffalo
 
materi pajak
materi pajakmateri pajak
materi pajak
 
'Deranged' Feedback
'Deranged' Feedback'Deranged' Feedback
'Deranged' Feedback
 
AS Media Questionnaire Evaluation
AS Media Questionnaire EvaluationAS Media Questionnaire Evaluation
AS Media Questionnaire Evaluation
 
Philof21centurylearning
Philof21centurylearningPhilof21centurylearning
Philof21centurylearning
 
Tutorial menyecan dengan ac dsee
Tutorial menyecan dengan ac dseeTutorial menyecan dengan ac dsee
Tutorial menyecan dengan ac dsee
 
Storyboard For Preliminary Excercise
Storyboard For Preliminary ExcerciseStoryboard For Preliminary Excercise
Storyboard For Preliminary Excercise
 
2010 Subaru Tribeca Buffalo
2010 Subaru Tribeca Buffalo2010 Subaru Tribeca Buffalo
2010 Subaru Tribeca Buffalo
 
S Ohlhoff Sport Mega Conference Stellenbosch Presentation Dec 2009
S Ohlhoff Sport Mega Conference Stellenbosch Presentation Dec 2009S Ohlhoff Sport Mega Conference Stellenbosch Presentation Dec 2009
S Ohlhoff Sport Mega Conference Stellenbosch Presentation Dec 2009
 
Psa science tech idol ii update 3
Psa science tech idol ii update 3Psa science tech idol ii update 3
Psa science tech idol ii update 3
 
Weizmann Uk Annual Accounts Final
Weizmann Uk Annual Accounts FinalWeizmann Uk Annual Accounts Final
Weizmann Uk Annual Accounts Final
 

Similar to SANS WhatWorks - Compliance & DLP

11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteDave Steer
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Building World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsBuilding World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsJoyce Brocaglia
 
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...Dana Gardner
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentJonathan Sinclair
 
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Dana Gardner
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - HackersDendreon
 
Table of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber SecurityTable of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber SecurityAaron Lancaster
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesAnton Chuvakin
 
The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantJohn Bedrick
 
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...Dana Gardner
 
Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)ClubHack
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Dana Gardner
 
PCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and RealityPCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and RealityAnton Chuvakin
 
The High Price Of Faking Your Pci Compliance Status
The High Price Of Faking Your Pci Compliance StatusThe High Price Of Faking Your Pci Compliance Status
The High Price Of Faking Your Pci Compliance StatusGlobalDataLock.com
 
PCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton Chuvakin
PCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton ChuvakinPCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton Chuvakin
PCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton ChuvakinAnton Chuvakin
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metricsAbhishek Sood
 

Similar to SANS WhatWorks - Compliance & DLP (20)

11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Myths of PCI DSS
Myths of PCI DSSMyths of PCI DSS
Myths of PCI DSS
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Building World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsBuilding World Class Cybersecurity Teams
Building World Class Cybersecurity Teams
 
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity component
 
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
 
Table of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber SecurityTable of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber Security
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and Technologies
 
The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being Compliant
 
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
 
Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
 
PCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and RealityPCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and Reality
 
The High Price Of Faking Your Pci Compliance Status
The High Price Of Faking Your Pci Compliance StatusThe High Price Of Faking Your Pci Compliance Status
The High Price Of Faking Your Pci Compliance Status
 
PCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton Chuvakin
PCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton ChuvakinPCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton Chuvakin
PCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton Chuvakin
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

SANS WhatWorks - Compliance & DLP

  • 1. Sleeping With The Enemy: Better Living Through Hacking Compliance (budgets) Or Navigating the Corridors of the Compliance Industrial Complex January, 2010
  • 2. In a nutshell Compliance != Security A selection of frothy rants about PCI in particular, then “But Nick? What can I, a mere infosec professional, do?”; A New and Improved Way to Articulate Risk; Scattered throughout: Propaganda, crypto-advertising for TRM (when you engage TRM as a consultant, you and your boss become measurably more attractive to the opposite sex.)
  • 3. Compliance != Security Compliance == Compliance Are you {compliant|secure} like this guy is {compliant|secure} ?
  • 4. Compliance & DLP What the hell does a rant about compliance have to do with DLP? Well, if you’re like most infosec professionals, You’re tasked with reducing data loss; and You’re tasked with increasing compliance tasks and reducing audit dings for, you know, everything I aver these goals are in conflict
  • 5. DLP is not a Technology Issue Ironically, this is being presented at a conference called, WhatWorks in DLP Note, ladies and gentlemen, the Red Square of Death. Image: The 451 Group, Mind The Data Gap, June 2008, http://www.the451group.com
  • 6. Why Rulesets Exist Ruleset writers aren’t evil, but they are reactive SOX, HIPAA, PCI – all were in response to a specific problem All attempt to raise the level of overall “security” How they do so is the problem Some rulesets are less cynical than others
  • 7. PCI on PCI “The PCI Security Standards Council’s mission is to enhance payment account data security by driving education and awareness of the PCI Security Standards. The organization was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide, and Visa, Inc.”
  • 8. “Not worthless.” “I do not believe the PCI Standards are worthless; in the absence of other requirements, they do serve some purpose. But I do want to dispel the myth once and for all that PCI compliance is enough to keep a company secure. It is not, and the credit card companies acknowledge that.” -Rep. Yvette D Clarke (D-N.Y.) chairwoman of the Subcommittee On Emerging Threats, Cybersecurity and Science and Technology, Committee on Homeland Security
  • 9. The PCI Dilemma PCI says it wants to, “Raise the bar” by setting forth some highly specific tasks and standards. Unfortunately they were specific to a paradigm gone by, and those who don’t comply get fined and hassled For offloading risk from card brands, PCI has raised the bar. For data security, not only has PCI not, “raised the floor,” in fact it’s substantially lowered the ceiling Because it is expensive in terms of money and resources, PCI is not the minimum standard, it’s the maximum effort that many organizations make.
  • 10. Why Compliance is InfoSec’s Problem As punishment for making everything so complicated, information security professionals have been saddled with compliance management.
  • 11. OK, here’s really why… Enron. Yelling. SOX. “Oh, crap – who’s going to deal with this? Hey! Information Security!”
  • 12. The CEO should do better The CEO who lets the Security organization become the compliance department has abdicated to the government and Payment Card Industry his responsibility to understand and manage organizational risk. That is a fiduciary breach of his responsibility to shareholders. In addition to firing his ass, this should also be a floggable offense.
  • 13. Here’s why present-day implementations of PCI are not just not good for security, but why they’re antithetical to good security.
  • 14. Setting The Bar … at 1984 We’re in an Orwellian IT universe, and criminals are Big Brother They have better configuration management data on us than our own information security groups. They know exactly what we’re doing because PCI tells them what we’re doing. They have rapidly evolving and advanced persistent threats, new generations of attack tools and a wildly changed attack paradigm We have anti-virus and IDS/IPS and firewalls
  • 15. When Rules & Taxes Matter When government wishes to discourage behavior, they have options: They can shunt it off to someone else (“Faith Based Community Initiatives,” etc They can tax it They can legislate it Taxes and legislation clearly discourage behaviors…
  • 16. Smoking in New York City March, 2003: Smoking banned at NYC restaurants, bars, nightclubs
  • 18. Teen Smoking Rates in NYC * no data available for 2007
  • 19. Now, let’s look at how well PCI has worked to prevent loss of PII
  • 20. Records Lost…. 2006: PCI 1.1 PCI 1.0 2008: PCI 1.2
  • 21. Records Lost…. SEPT 2006: PCI 1.1 DEC 2004: PCI 1.0 OCT 2008: PCI 1.2
  • 24. A retort “From all accounts it appears that many of the murders and drug-smuggling operations can be attributed to the Mafia. What would the world look like if we ignored their crimes when measuring the success of policing efforts?”
  • 25. Statistics Manipulation Of course, I’m being intellectually dishonest with my statistics on PCI. In the slides about smoking we deal with known and proved risks and threats. The PCI council behaves as if it is too, but security is a dynamic, transactional environment comprising constantly evolving technology. PCI makes specific statements about security which are suspect at any point in time let alone in a continuum, and pretends it’s delivering consistent effect against a static equation. Logicians call this behavior, “Stupid.” Okay, they call it “Confounded thinking.”
  • 26. The Trouble With PCI SOX, HIPAA, etc made their goals clear and the means vague. This caused confusion, but the market sorted it out. PCI is a compilation of a hunches on how to prevent breaches: the specific means to the desired end (that is, to offload risk onto merchants). How about not confusing the means and end? Just punish the failure to secure data, and let the free market figure out how best to prevent breaches.
  • 27. PCI is a Protection Racket by a Cabal. Ponemon 2009 PCI DSS Compliance Study: 71% of companies don’t treat PCI as a strategic initiative 79% have experienced a data breach 56% don’t believe PCI compliance improves their data security posture 60 % say they can’t achieve PCI compliance Recent studies say 30% of the IT security budget is spent on PCI compliance Let’s call it 20%. TWENTY PERCENT. Plus, when you’re breached, you got your fines and your publicity hit. That’s a regressive, unofficial tax for which we get back nothing. And the card brands get to offload risk onto merchants.
  • 28. If we’re gonna tax, let’s tax… D’OH!TAX Fun Fact: This tax will hit many banks! D’OH!TAX THE a. $1,000 per record breached; b. Raises $250,000,000,000 for deficit reduction – WHAT bailout?; c. Replaces all PCI requirements; d. All other fines & reporting requirements still apply
  • 29. While I’m in Fantasy Land… I also want a pony.
  • 30. What is to be done?
  • 31. First of all… Join the rebel alliance. Don’t let a dismal failure be held up as a success: Loose lips sink ships - let’s sink one: be vocal about PCI failures and how they affect your job, your happiness and your effectiveness as an info-security pro. Because if you don’t speak up, other rule-writers will hold up PCI as the model of how this stuff should be done.
  • 32. Be Constructive Rather than berate something which isn’t going away, let’s work to change these arbitrarily objective compliance overviews like PCI into subjective risk analysis tools. Let’s be wiser about how we look at PCI and use it as a lever to free up budget funds for things that we, as security professionals, believe will positively impact the bottom line.
  • 33. Then… Reduce the suck. Work the system as best you can. Question – loudly – things that seem like window-dressing. Ask, “What is the intent of this?” Use compliance requirements to justify spending on sensible things, like greatly expanding pen testing, or setting up an incident response workbench.
  • 34. Compensating Controls If you are not engaged deeply with your QSA in substantive conversations regarding compensating controls, you either don’t care, or: You don’t understand your environment; You don’t understand the requirements; and You are wasting lots of money on PCI. You pay those people. Make them work for you.
  • 35. Let’s Get Back To Basics
  • 36. “If you can’t measure, you can’t improve.” Well, yeah, but… Right now, we’re counting things that help the vendors sell us stuff. Not only do we count these things, we let vendors tell us how important one is relative to another! It’s fine to count things, but if you’re counting the things that matter to the vendors, not to your business, you’re not doing yourself any favors According to this, everything’s getting better! Awesome!
  • 37. Every business is different A fashion house can’t tell a media firm what’s important; hell, one media firm can’t tell another what’s important. This is not just cross industry – it’s true in the same company three months later! Each pen tester, each auditor will have different results even in the same company
  • 38.
  • 39.
  • 40. Articulating Risk How do you articulate risk? Doctors listen most to mom’s statements like, “Something’s just not right.” Say to your CIO, “This feels icky” How Icky? On a scale of 1 to eeew! Eeeeeeew A little
  • 41. An Example PCI 12.2 talks about internal and external pen testing teams. There is great bang-for-buck setting up internal pen-testing team: To talk to pen testers To test patches, controls To enumerate hosts, processes, workflows To understand your environment To understand and positively affect config management
  • 42. Pick Your Battles Find out what you care about Attach your team to revenue producing projects Use PCI and compliance as a lever the budget Speak in terms of risk, not threat Count metrics that speak in dollars and time Yell when compliance makes you do something dumb or hate your job
  • 43. Questions? Contact us: Nick Selby, Managing Director nick.selby [ at] tridentrm.com Paul Davis, Chief Security Officer paul.davis[at ]tridentrm.com Clint Bruce, Chairman c.Bruce (at ) trg-ltd.com

Editor's Notes

  1. Brian Krebs on the increasing levels of data loss through paper.
  2. In July, 2002, Mayor Bloomberg raised the tax on cigarettes in New York City to ensure that they would have a minimum sales price of $7.50 a pack. This was done, he said, to spare the city the expense of thousands of smoking-related deaths and illnesses each year. The city backed this up with smoking cessation education, programs and support. Smoking has declines 27% in New York City since the tax was introduced; Smoking related deaths are down from more than 200 per 100,000 in 2002 to about 160 per 100,000 in 2007. Teen smoking fell from 18% of New York City teenagers in 2001 to 8.5% in 2007.