SlideShare a Scribd company logo
+
A Practical
Guide to
Improving PCI
Compliance
Posture

                       Presented by
    Sponsored by RSA   Diana Kelley, SecurityCurve
+ Agenda

  Failure          is not Cheap – But There is a Better
  Way
  Five Things          you Can Do to Improve your
  PCI Posture
  Practical
         Guide for Establishing PCI
  Improvements
  Conclusion




 Sponsored by RSA
+
    Failing PCI is Not Cheap – But
    There is a Better Way
       If you store, process, or transmit credit card data from
        one of the card brands you must be compliant with the
        PCI-DSS
       Failure isn’t cheap
           Must repeat the assessment process- average cost of $225,000
            US for a tier/level 1
           Other fees may apply
             WorldPay: monthly $25k fee from Visa & one time 25k fee
              from Mastercard
             Acquiring banks can increase transaction fees

       PCI is a people and information problem
           Requires a people and information centric solution


    Sponsored by RSA
+
    Five Things




    Sponsored by RSA
+
    The Five Steps Explained


    1.    Get Scope Under Control – Information
          Centric
          Anywhere   cardholder data resides is
            considered “in scope” of the assessment

    2.   Monitor Traffic in Real-time to Identify
         Broken Business Processes – Information
         Centric
          Once  you know where the data is, you need to
            monitor where it’s going and who is using it.

     Sponsored by RSA
+
    The Five Steps Explained

    3.    Establish a Repeatable Process for
          Assessments - People and Process Centric
          So     the information is there when it’s needed
    4.    Establish a Process to Mitigate PCI Risk -
          People Centric
         A   methodology that engages both IT and the
            business
    5.   Enforcement Containment of Cardholder
         Data – Information and People Centric
          Technical     controls to enforce the policy

     Sponsored by RSA
+



            Practical Guide for
             Establishing PCI
               Improvement


    Sponsored by RSA
+
    Get Scope Under Control

     Discover
             and Identify CardHolder Data
     throughout the organization
      Restrictit to the CDE
      Use automation for maximum effectiveness

     Things           to Look For
      Accuracy
      Scalability
      Coverage Breadth
      Minimum Impact



    Sponsored by RSA
+
    Monitor Traffic in Real-Time to Identify
    Broken Business Processes

     Oncethe CHD is located and contained,
     make sure it doesn’t leave
     DLP      can help but requires
      Accuracy
      Flexibility
      Non-Intrusive
      Alerting




    Sponsored by RSA
+
    Microsoft used DLP to discover PCI
    Data
       “Before we could do anything, we knew we had to locate
        our sensitive information and measure compliance to the
        policies already in place,”
          Olav Opedal, Security Program Manager at Microsoft.
           12TB of data
           30,000 file shares
           120,000 SharePoint sites
     Microsoft needed to scan everywhere sensitive data
      could be stored.
     “The unparalleled accuracy and unique features of RSA
      DLP Datacenter made it the only viable choice for
      discovering all our sensitive content.”


     Sponsored by RSA
+
    Establish a Repeatable Process


     Be    prepared for the audit
      Gather data in advance
      Perform continuous monitoring
      Use report templates

     Things           to Look For
      Tracking  Progress
      Centralized Management
      Historical Data



    Sponsored by RSA
+
    EMC

     Created  and implemented a repeatable data
     management process in just 4 weeks
      30,000 files
      1,200 owners
      43 countries

     Scanned  Structured and un-structured
      Answered the questions:
        Where is it?
        How is it stored?
        How is it used?
        Who uses it?

    Sponsored by RSA
+
    EMC - Continued

     Team  of 6 dedicated resources
      Integrated DLP discovery information into
       Archer
     Benefits
      Improved   corporate risk posture
      Demonstration of due care in providing
       protection
      Repeatable process quarter over quarter
      End user awareness
      Identification in trends quarter over quarter
      Knowledge base of end user data usage


    Sponsored by RSA
+
    Establish a Process to Mitigate PCI
    Risk
     Newthreats may be discovered, new risks
     exposed
      Have        a process in place to address them

     Tips      on Making it Work
      Engage  End Users
      Automate Work Flow
      Track and Report




    Sponsored by RSA
+
    Enforcing Controls to Prevent
    Leakage of Credit Card Data
     Back up all the policy and process work
     with technical controls
     Consider
      ExistingControls
      Risk Based Enforcement Containment




    Sponsored by RSA
+
    Special Considerations


     Tools
          used for PCI compliance may need to
     support
      RBAC
      Multi-Factor AuthN
      Complete Visibility
      Data Protection in Transit
      Data Protection at Rest
      Key Management
      Nothing Unnecessary


    Sponsored by RSA
+




    Sponsored by RSA
+
    Conclusion


     Start      with Scope
     It’s   a People, Process and Information problem
       So Take a People, Process and Information (PPI)
        Approach
       And use Tools that Support It


     Using         the 5 Steps Won’t Make PCI Easy
       But they will make the process easier
       And support continuous improvement and
        efficiencies over time

     Sponsored by RSA
Next Steps & How RSA Can Help
                                        • Discover assets and data
            Scope                       • Classify assets and data
                                        • Map to business processes

                                                                               Archer
                                        • Monitor web/email/hosts 24x7
          Monitor                       • Monitor assets through logs

                                                                               DLP
                                        • Manage comprehensive processes
     Assessment                         • Customize and automate workflows
                                                                               Security
                                                                               Analytics
                                        • Involve business and data owners
  Risk Mitigation                       • Enable communication with business

                                                                               Services
                                        • Enforce controls based on risk
          Controls                      • Automate controls enforcement




© Copyright 2011 EMC Corporation. All rights reserved.                                     19
Thank You




© Copyright 2011 EMC Corporation. All rights reserved.   20

More Related Content

What's hot

DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
Kim Jensen
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
NetIQ
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
DLT Solutions
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
Tudor Damian
 
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
Craig Adams
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
Adrian Dumitrescu
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
Corporacion Colombia Digital
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
Valery Boronin
 
Coffee on Kaseya - Houston
Coffee on Kaseya - HoustonCoffee on Kaseya - Houston
Coffee on Kaseya - Houston
Kaseya
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
Symantec
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...
CA API Management
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
Marc Crudgington, MBA
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
Hussein Al-Sanabani
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 

What's hot (19)

DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
Coffee on Kaseya - Houston
Coffee on Kaseya - HoustonCoffee on Kaseya - Houston
Coffee on Kaseya - Houston
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 

Viewers also liked

A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerSubhajit Bhuiya
 
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010 Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
EMC
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
Microsoft TechNet - Belgium and Luxembourg
 
Hodočašće u lourdes i paray le-monial 2011 - kopija
Hodočašće u lourdes  i paray le-monial 2011 - kopijaHodočašće u lourdes  i paray le-monial 2011 - kopija
Hodočašće u lourdes i paray le-monial 2011 - kopija
dsrdoc
 
RSA Security Data Access Governance Infographic
RSA Security Data Access Governance InfographicRSA Security Data Access Governance Infographic
RSA Security Data Access Governance Infographic
EMC
 
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...
EMC
 
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
Dr. Raju M. Mathew
 
RSA Discovers Massive Boleto Fraud Ring in Brazil
RSA Discovers Massive Boleto Fraud Ring in BrazilRSA Discovers Massive Boleto Fraud Ring in Brazil
RSA Discovers Massive Boleto Fraud Ring in Brazil
EMC
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big Data
EMC
 
FLSS: documento di design
FLSS: documento di designFLSS: documento di design
FLSS: documento di design
Sara M
 
Lessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanzaLessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanza
Cristina Belloni
 
Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013
Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013
Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013
EMC
 
KERALA - ALTERNATIVE DEVELOPMENT STRATEGY FOR SAVING 35 MILLION PEOPLE IN THE...
KERALA - ALTERNATIVE DEVELOPMENT STRATEGY FOR SAVING 35 MILLION PEOPLE IN THE...KERALA - ALTERNATIVE DEVELOPMENT STRATEGY FOR SAVING 35 MILLION PEOPLE IN THE...
KERALA - ALTERNATIVE DEVELOPMENT STRATEGY FOR SAVING 35 MILLION PEOPLE IN THE...Dr. Raju M. Mathew
 
Animal presentation
Animal presentationAnimal presentation
Animal presentationjasoncowen
 
Amazing facts about_big_4_accounting_firms
Amazing facts about_big_4_accounting_firmsAmazing facts about_big_4_accounting_firms
Amazing facts about_big_4_accounting_firmsChandan Dubey
 

Viewers also liked (20)

A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archer
 
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010 Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
 
Math
MathMath
Math
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Hodočašće u lourdes i paray le-monial 2011 - kopija
Hodočašće u lourdes  i paray le-monial 2011 - kopijaHodočašće u lourdes  i paray le-monial 2011 - kopija
Hodočašće u lourdes i paray le-monial 2011 - kopija
 
RSA Security Data Access Governance Infographic
RSA Security Data Access Governance InfographicRSA Security Data Access Governance Infographic
RSA Security Data Access Governance Infographic
 
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...
 
De crypte
De crypteDe crypte
De crypte
 
M i r n y
M i r n yM i r n y
M i r n y
 
3349
33493349
3349
 
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
 
RSA Discovers Massive Boleto Fraud Ring in Brazil
RSA Discovers Massive Boleto Fraud Ring in BrazilRSA Discovers Massive Boleto Fraud Ring in Brazil
RSA Discovers Massive Boleto Fraud Ring in Brazil
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big Data
 
FLSS: documento di design
FLSS: documento di designFLSS: documento di design
FLSS: documento di design
 
Lessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanzaLessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanza
 
Pig
PigPig
Pig
 
Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013
Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013
Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013
 
KERALA - ALTERNATIVE DEVELOPMENT STRATEGY FOR SAVING 35 MILLION PEOPLE IN THE...
KERALA - ALTERNATIVE DEVELOPMENT STRATEGY FOR SAVING 35 MILLION PEOPLE IN THE...KERALA - ALTERNATIVE DEVELOPMENT STRATEGY FOR SAVING 35 MILLION PEOPLE IN THE...
KERALA - ALTERNATIVE DEVELOPMENT STRATEGY FOR SAVING 35 MILLION PEOPLE IN THE...
 
Animal presentation
Animal presentationAnimal presentation
Animal presentation
 
Amazing facts about_big_4_accounting_firms
Amazing facts about_big_4_accounting_firmsAmazing facts about_big_4_accounting_firms
Amazing facts about_big_4_accounting_firms
 

Similar to RSA Presentation - 5 Steps to Improving PCI Compliance

IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
Skoda Minotti
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking
 
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
DataWorks Summit
 
Data Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceData Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI Compliance
David Walker
 
How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...
Ulf Mattsson
 
Advanced Logging and Analysis for SOA, Social, Cloud and Big Data
Advanced Logging and Analysis for SOA, Social, Cloud and Big DataAdvanced Logging and Analysis for SOA, Social, Cloud and Big Data
Advanced Logging and Analysis for SOA, Social, Cloud and Big Data
Perficient, Inc.
 
Time to re think our security process
Time to re think our security processTime to re think our security process
Time to re think our security process
Ulf Mattsson
 
Rightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public CloudRightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public Cloud
RightScale
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
Andris Soroka
 
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationKASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
Denodo
 
TrustedAgent and Defense Industrial Base (DIB)
TrustedAgent and Defense Industrial Base (DIB)TrustedAgent and Defense Industrial Base (DIB)
TrustedAgent and Defense Industrial Base (DIB)
Tuan Phan
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Data Governance for Data Lakes
Data Governance for Data LakesData Governance for Data Lakes
Data Governance for Data Lakes
Kiran Kamreddy
 
Data summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data opsData summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data ops
Ryan Gross
 
20100430 introduction to business objects data services
20100430 introduction to business objects data services20100430 introduction to business objects data services
20100430 introduction to business objects data services
Junhyun Song
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Ben Rothke
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
AlienVault
 
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...
DataWorks Summit
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
Security Innovation
 
Defining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business EnvironmentDefining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business Environment
Caserta
 

Similar to RSA Presentation - 5 Steps to Improving PCI Compliance (20)

IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance Requirements
 
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
 
Data Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceData Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI Compliance
 
How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...
 
Advanced Logging and Analysis for SOA, Social, Cloud and Big Data
Advanced Logging and Analysis for SOA, Social, Cloud and Big DataAdvanced Logging and Analysis for SOA, Social, Cloud and Big Data
Advanced Logging and Analysis for SOA, Social, Cloud and Big Data
 
Time to re think our security process
Time to re think our security processTime to re think our security process
Time to re think our security process
 
Rightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public CloudRightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public Cloud
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationKASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
 
TrustedAgent and Defense Industrial Base (DIB)
TrustedAgent and Defense Industrial Base (DIB)TrustedAgent and Defense Industrial Base (DIB)
TrustedAgent and Defense Industrial Base (DIB)
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Data Governance for Data Lakes
Data Governance for Data LakesData Governance for Data Lakes
Data Governance for Data Lakes
 
Data summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data opsData summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data ops
 
20100430 introduction to business objects data services
20100430 introduction to business objects data services20100430 introduction to business objects data services
20100430 introduction to business objects data services
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Defining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business EnvironmentDefining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business Environment
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
EMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
EMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
EMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
EMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
EMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
EMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
EMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
EMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
EMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
EMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

RSA Presentation - 5 Steps to Improving PCI Compliance

  • 1. + A Practical Guide to Improving PCI Compliance Posture Presented by Sponsored by RSA Diana Kelley, SecurityCurve
  • 2. + Agenda  Failure is not Cheap – But There is a Better Way  Five Things you Can Do to Improve your PCI Posture  Practical Guide for Establishing PCI Improvements  Conclusion Sponsored by RSA
  • 3. + Failing PCI is Not Cheap – But There is a Better Way  If you store, process, or transmit credit card data from one of the card brands you must be compliant with the PCI-DSS  Failure isn’t cheap  Must repeat the assessment process- average cost of $225,000 US for a tier/level 1  Other fees may apply  WorldPay: monthly $25k fee from Visa & one time 25k fee from Mastercard  Acquiring banks can increase transaction fees  PCI is a people and information problem  Requires a people and information centric solution Sponsored by RSA
  • 4. + Five Things Sponsored by RSA
  • 5. + The Five Steps Explained 1. Get Scope Under Control – Information Centric  Anywhere cardholder data resides is considered “in scope” of the assessment 2. Monitor Traffic in Real-time to Identify Broken Business Processes – Information Centric  Once you know where the data is, you need to monitor where it’s going and who is using it. Sponsored by RSA
  • 6. + The Five Steps Explained 3. Establish a Repeatable Process for Assessments - People and Process Centric  So the information is there when it’s needed 4. Establish a Process to Mitigate PCI Risk - People Centric A methodology that engages both IT and the business 5. Enforcement Containment of Cardholder Data – Information and People Centric  Technical controls to enforce the policy Sponsored by RSA
  • 7. + Practical Guide for Establishing PCI Improvement Sponsored by RSA
  • 8. + Get Scope Under Control  Discover and Identify CardHolder Data throughout the organization  Restrictit to the CDE  Use automation for maximum effectiveness  Things to Look For  Accuracy  Scalability  Coverage Breadth  Minimum Impact Sponsored by RSA
  • 9. + Monitor Traffic in Real-Time to Identify Broken Business Processes  Oncethe CHD is located and contained, make sure it doesn’t leave  DLP can help but requires  Accuracy  Flexibility  Non-Intrusive  Alerting Sponsored by RSA
  • 10. + Microsoft used DLP to discover PCI Data  “Before we could do anything, we knew we had to locate our sensitive information and measure compliance to the policies already in place,” Olav Opedal, Security Program Manager at Microsoft.  12TB of data  30,000 file shares  120,000 SharePoint sites  Microsoft needed to scan everywhere sensitive data could be stored.  “The unparalleled accuracy and unique features of RSA DLP Datacenter made it the only viable choice for discovering all our sensitive content.” Sponsored by RSA
  • 11. + Establish a Repeatable Process  Be prepared for the audit  Gather data in advance  Perform continuous monitoring  Use report templates  Things to Look For  Tracking Progress  Centralized Management  Historical Data Sponsored by RSA
  • 12. + EMC  Created and implemented a repeatable data management process in just 4 weeks  30,000 files  1,200 owners  43 countries  Scanned Structured and un-structured  Answered the questions:  Where is it?  How is it stored?  How is it used?  Who uses it? Sponsored by RSA
  • 13. + EMC - Continued  Team of 6 dedicated resources  Integrated DLP discovery information into Archer  Benefits  Improved corporate risk posture  Demonstration of due care in providing protection  Repeatable process quarter over quarter  End user awareness  Identification in trends quarter over quarter  Knowledge base of end user data usage Sponsored by RSA
  • 14. + Establish a Process to Mitigate PCI Risk  Newthreats may be discovered, new risks exposed  Have a process in place to address them  Tips on Making it Work  Engage End Users  Automate Work Flow  Track and Report Sponsored by RSA
  • 15. + Enforcing Controls to Prevent Leakage of Credit Card Data  Back up all the policy and process work with technical controls  Consider  ExistingControls  Risk Based Enforcement Containment Sponsored by RSA
  • 16. + Special Considerations  Tools used for PCI compliance may need to support  RBAC  Multi-Factor AuthN  Complete Visibility  Data Protection in Transit  Data Protection at Rest  Key Management  Nothing Unnecessary Sponsored by RSA
  • 17. + Sponsored by RSA
  • 18. + Conclusion  Start with Scope  It’s a People, Process and Information problem  So Take a People, Process and Information (PPI) Approach  And use Tools that Support It  Using the 5 Steps Won’t Make PCI Easy  But they will make the process easier  And support continuous improvement and efficiencies over time Sponsored by RSA
  • 19. Next Steps & How RSA Can Help • Discover assets and data Scope • Classify assets and data • Map to business processes Archer • Monitor web/email/hosts 24x7 Monitor • Monitor assets through logs DLP • Manage comprehensive processes Assessment • Customize and automate workflows Security Analytics • Involve business and data owners Risk Mitigation • Enable communication with business Services • Enforce controls based on risk Controls • Automate controls enforcement © Copyright 2011 EMC Corporation. All rights reserved. 19
  • 20. Thank You © Copyright 2011 EMC Corporation. All rights reserved. 20