Myths and Realities of Data Security and Compliance: Ulf Mattsson, CTO, Protegrity
|
|
|
- Joshua Fox
- 10 years ago
- Views:
Transcription
1 Myths and Realities of Data Security and Compliance: The Risk-based Data Protection Solution Ulf Mattsson, CTO, Protegrity
2 Ulf Mattsson 20 years with IBM Development, Manufacturing & Services Inventor of 21 patents - Encryption Key Management, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention. Received Industry's 2008 Most Valuable Performers (MVP) award together with technology leaders from IBM, Cisco Systems., Ingres, Google and other leading companies. Co-founder of Protegrity (Data Security Management) Received US Green Card of class EB 11 Individual of Extraordinary Ability after endorsement by IBM Research in Research member of the International Federation for Information Processing (IFIP) WG 11.3 Data and Application Security American National Standards Institute (ANSI) X9 Information Systems Audit and Control Association (ISACA) Information Systems Security Association (ISSA) Institute of Electrical and Electronics Engineers (IEEE)
3 ISACA Articles (NYM)
4
5 Topics Review current/evolving data security risks Explore the methods that enable organizations to achieve the right balance between cost, performance, usability, compliance demands and real-world security needs Develop a risk adjusted methodology for securing data and evaluating security solutions Review real world examples: protecting PCI, PII and MNPI (Material Non-Public Information) data throughout its entire lifecycle Other topics? Q&A
6 Protect Sensitive Data PCI & Customer Data Credit & Loyalty cards Banking/mortgage data Customer profiles Prospect information Company Data Salary / bonus HR data Corporate secrets Financial results PII Social security number Drivers license number Private account numbers Date of birth Health Records Insurance claims Medical records Prescriptions Billing information
7 Data Protection Challenges Actual protection is not the challenge Management of solutions Key management Security policy Auditing and reporting Minimizing impact on business operations Transparency Performance vs. security Minimizing the cost implications Maintaining compliance Implementation Time
8 Developing a Risk-adjusted Data Protection Plan Know Your Data Find Your Data Understand Your Enemy Understand the New Options in Data Protection Deploy Defenses Crunch the Numbers
9 The Gartner 2010 CyberThreat Landscape
10 Data Security Remains Important for Most Source: Forrester, 2009
11 Know Your Data Identify High Risk Data Begin by determining the risk profile of all relevant data collected and stored Data that is resalable for a profit Value of the information to your organization Anticipated cost of its exposure Data Field Risk Level Credit Card Number 25 Social Security Number 20 CVV 20 Customer Name 12 Secret Formula 10 Employee Name 9 Employee Health Record 6 Zip Code 3
12 Understand Your Enemy & Data Attacks Breaches attributed to insiders are much larger than those caused by outsiders The type of asset compromised most frequently is online data, not laptops or backups: Source: Verizon Business Data Breach Investigations Report (2008 and 2009)
13 Market Drivers for Deeper Data Security Brand damage Staying out of the headlines Damage to credibility Regulatory mandates PCI Country/Provincial/State Privacy Laws Sarbanes-Oxley HIPAA Cost of recovery and fixes - Forrester Research gives a cost range of $90-$305 per record Increasing liability and insurance
14 Information Security Breaches In the U.S., 2005 was the year of the security breach Followed by 2006, 2007, 2008 and Since 2005, over 1,000 information security breaches Choice Point - Card Systems Bank of America - Boston Globe Lexis Nexis - Veterans Administration Heartland Payment Systems - TJX Over 236 million potentially affected Over 40 U.S. jurisdictions have security breach notification laws California SB 1386 started the trend New federal breach notification law for health information Numerous federal bills
15 State Security Breach Notification Laws Generally, the duty to notify arises when unencrypted computerized personal information was acquired or accessed by an unauthorized person Personal information is an individual s name, combined with: SSN Driver s license or state ID card number Account, credit or debit card number, along with password or access code But state laws differ: Computerized v. paper data Definition of PII Notification to state agencies Notification to CRAs Timing of individual notification Harm threshold Contents of notification letter
16 Federal Breach Notification Law The HITECH Act has changed the federal breach notification landscape HHS and FTC have promulgated breach notification rules pursuant to HITECH Act requirements The HITECH Act requires HIPAA covered entities to: notify individuals whose unsecured protected health information in any format has been, or is reasonably believed to have been accessed, acquired or disclosed as a result of a breach Business associates are responsible for notifying covered entities of a breach
17 Recent FTC Enforcement Actions Federal Trade Commission (FTC) enforcement authority: Section 5 of the FTC Act Most FTC privacy enforcement actions result from security breaches Card Systems, Petco, ChoicePoint, Tower Records, DSW, Barnes & Noble.com, BJ s Wholesale Club, Guess.com Inc., CVS, Caremark, Genica Corporation Division of Privacy and Identity Protection Enforcement trends
18 Costs of Non-Compliance with PCI Costs of non-compliance can be significant Card brands fine merchant banks, and costs are passed through to merchants by contract Possible fines of $5,000 to $25,000 per month for Level 1 and 2 merchants that have not validated compliance In the event of a security breach, possible fines of up to $500,000 per incident plus associated costs
19 Avoiding Breach Notification HHS issued guidance on April 17, 2009 setting forth an exhaustive list of what technologies and methodologies will render PHI secure. HHS provided additional guidance on August 24, Technologies and Methodologies that will render PHI secure: Encryption. Destruction. Nothing else will render your PHI secure. In most recent guidance, HHS: Rejected access controls, such as firewalls, as a method for securing PHI.
20 Understand Your Enemy Probability of Attacks Higher Probability What is the Probability of Different Attacks on Data? Errors and Omissions Lost Backups, In Transit RECENT ATTACKS Application User (e.g. SQL Injection) SQL Users Network or Application/RAM Sniffer Valid User for the Server (e.g. Stack Overflow, data sets) Application Developer, Valid User for Data Source: IBM Silicon Valley Lab(2009) Administrator Higher Complexity
21 Dataset Comparison Data Type Source: 2009 Data Breach Investigations Supplemental Report, Verizon Business RISK team
22 Targeted Threat Growth
23 Choose Your Defenses Data Entry Where is data exposed to attacks? Data System Application Database File System Storage (Disk) Backup (Tape) RECENT ATTACKS SNIFFER ATTACK SQL INJECTION MALWARE / TROJAN DATABASE ATTACK FILE ATTACK MEDIA ATTACK ATTACKERS Authorized/ Un-authorized Users Database Admin System Admin HW Service People Contractors Unprotected sensitive information: Protected sensitive information
24 Compliance How to be Able to Produce Required Reports Database Application/Too l Patient a b c Health Record xxx xxx xxx Database Process 001 User X (or DBA) 3 rd Party Performance? DB Native Compliant User Access Patient Health Record x Read a xxx DBA Read b xxx z Write c xxx Not Compliant Possible DBA manipulation User Access Patient Health Record z Write c xxx Not Compliant No Read Log Protected Log User Access Patient Health Data Record Health Data File OS File Health Data File PHI002 3 rd Party Database Process 0001 Database Process 0001 Read?? PHI002 Read?? PHI002 No Information On User or Record Database Process 0001 Write?? PHI002 Unprotected sensitive information: Protected sensitive information
25 Compliance - How to Control ALL Access to PHI Data DBA Box Database Administration Database Encrypted Backup (Tape) Encrypted Compliant File Encrypted Encrypted Database Administration Database Clear Text Backup (Tape) Clear Text Not Compliant File Encrypted Clear Text Unprotected sensitive information: Protected sensitive information
26 Top 15 Threat Action Types 2009 Data Breach Investigations Supplemental Report, Verizon Business RISK team
27 Top 15 Threat Action Types Source: 2009 Data Breach Investigations Supplemental Report, Verizon Business RISK team
28 Data Level Attacks on the Enterprise Data Flow MALWARE / TROJAN DBA ATTACK Endpoint Internet Serve r DMZ Load Balancing Enterprise Apps TRUSTED SEGMENT DB Server SAN, NAS, Tape TRANSACTIONS Internal Users NW Wireless Proxy FW IDS/ IPS Web Apps Proxy FW Network Devices Proxy FW Server SQL INJECTION SNIFFER ATTACK MEDIA ATTACK OS ADMIN FILE ATTACK
29 Addressing Data Protection Challenges Full mapping of sensitive data flow Where is the data Where does it need to be Identify what data is needed for processing in which applications What are the performance SLAs Understand the impact of changing/removing data Will it break legacy systems Address PCI, strategize for the larger security issue
30 Protecting the Data Flow - Example
31 Top 6 threat action types - Mitigation Encryption of data in transit Token or Point-to-point encryption (E2EE) Monitoring And blocking Abuse of resources Token, Point-to-point encryption (E2EE) or File protection Infected systems Monitoring And blocking Collect usernames and passwords Specially crafted SQL statements Web Application Firewall Known usernames and passwords Monitoring And blocking Source: 2009 Data Breach Investigations Supplemental Report, Verizon Business RISK team
32 Example of Secure Login One Time Password
33 Positioning Different Data Protection Approaches
34 Data Protection Challenges Actual protection is not the challenge Management of solutions Key management Reporting Policy Minimizing impact on business operations Performance v. security Minimizing impact (and costs) Changes to applications Impact on downstream systems Time
35 The Goal: Good, Cost Effective Security The goal is to deliver a solution that is a balance between security, cost, and impact on the current business processes and user community Security plan - short term, long term, ongoing How much is good enough Security versus compliance Good Security = Compliance Compliance Good Security
36 Choose Your Defenses Different Approaches
37 Choose Your Defenses Cost Effective PCI Encryption 74% WAF 55% DLP 43% DAM 18% Source: 2009 PCI DSS Compliance Survey, Ponemon Institute
38 Choose Your Defenses Cost Effective PCI
39 Choose Your Defenses Find the Balance Cost Cost of Aversion Protection of Data Total Cost Optimal Risk Expected Losses from the Risk I Active Protection I Passive Protection Risk Level
40 Evaluation Criteria Performance Impact on operations - end users, data processing windows Storage Impact on data storage requirements Security & Separation of Duties How secure Is the data at rest Impact on data access separation of duties Transparency Changes to application(s) Impact on supporting utilities and processes
41 Choose Your Defenses - Operational Impact Passive Database Protection Approaches Database Protection Approach Web Application Firewall Performance Storage Security Transparency Separation of Duties Data Loss Prevention Database Activity Monitoring Database Log Mining Best Worst Source: 2009 Protegrity Survey
42 Choose Your Defenses - Operational Impact Active Database Protection Approaches Database Protection Approach Application Protection - API Performance Storage Security Transparency Separation of Duties Column Level Encryption; FCE, AES, 3DES Column Level Replacement; Tokens Tablespace - Datafile Protection Best Worst Source: 2009 Protegrity Survey
43 Choose Your Defenses Example Encryption Collection Point of Sale E-Commerce Branch Office Information in the wild - Short lifecycle / High risk Aggregation Temporary information - Short lifecycle / High risk Operations Operating information - Typically 1 or more year lifecycle -Broad and diverse computing and database environment Data Token Analysis Decision making information - Typically multi-year lifecycle - Homogeneous environment - High volume database analysis Archive Archive -Typically multi-year lifecycle -Preserving the ability to retrieve the data in the future is important
44 Choose Your Defenses New Methods Format Controlling Encryption Example of Encrypted format: Key Manager Application Databases Data Tokenization Example of Token format: Token Server Key Manager Application Databases Token
45 Newer Data Protection Options Format Controlling Encryption (FCE)
46 What Is FCE? Where did it come from? Before 2000 Different approaches, some are based on block ciphers (AES, 3DES ) Before 2005 Used to protect data in transit within enterprises What exactly is it? Secret key encryption algorithm operating in a new mode Cipher text output can be restricted to same as input code page some only supports numeric data The new modes are not approved by NIST
47 FCE Selling Points Ease of deployment -- limits the database schema changes that are required. Reduces changes to downstream systems Applicability to data in transit provides a strict/known data format that can be used for interchange Storage space does not require expanded storage Test data partial protection Outsourced environments & virtual servers
48 FCE Considerations Unproven level of security makes significant alterations to the standard AES algorithm Encryption overhead significant CPU consumption is required to execute the cipher Key management is not able to attach a key ID, making key rotation more complex - SSN Some implementations only support certain data (based on data size, type, etc.) Support for big iron systems is not portable across encodings (ASCII, EBCDIC) Transparency some applications need full clear text
49 FCE Use Cases Suitable for lower risk data Compliance to NIST standard not needed Distributed environments Protection of the data flow Added performance overhead can be accepted Key rollover not needed transient data Support available for data size, type, etc. Point to point protection if big iron mixed with Unix or Windows Possible to modify applications that need full clear text or database plug-in available
50 Applications are Sensitive to the Data Format Data Type Bin Data Binary (Hash) - Binary (Encryption) - No Applications Few Applications Alphanum (FCE, Token) - Many Applications Increased intrusiveness: - Application changes Text Data Numeric (FCE, Token) - Most Applications - Limitations in functionality - Limitations in data search - Performance issues Numeric (Clear Text) - All Applications I Original I Longer Data Field Length This is a generalized example
51 Newer Data Protection Options Data Tokenization
52 What Is Data Tokenization? Where did it come from? Found in Vatican archives dating from the 1300s In 1988 IBM introduced the Application System/400 with shadow files to preserve data length In 2005 vendors introduced tokenization of account numbers What exactly is it? It IS NOT an encryption algorithm or logarithm. It generates a random replacement value which can be used to retrieve the actual data later (via a lookup) Still requires strong encryption to protect the lookup table(s)
53 Tokenization Selling Points Provides an alternative to masking in production, test and outsourced environments Limits schema changes that are required. Reduces impact on downstream systems Can be optimized to preserve pieces of the actual data in-place smart tokens Greatly simplifies key management and key rotation tasks Centrally managed, protected reduced exposure Enables strong separation of duties Renders data out of scope for PCI
54 Tokenization Considerations Transparency not transparent to downstream systems that require the original data Performance & availability imposes significant overhead from the initial tokenization operation and from subsequent lookups Performance & availability imposes significant overhead if token server is remote or outsourced Security vulnerabilities of the tokens themselves randomness and possibility of collisions Security vulnerabilities typical in in-house developed systems exposing patterns and attack surfaces
55 Tokenization Use Cases Suitable for high risk data payment card data When compliance to NIST standard needed Long life-cycle data Key rollover easy to manage Centralized environments Suitable data size, type, etc. Support for big iron mixed with Unix or Windows Possible to modify the few applications that need full clear text or database plug-in available
56 Tokenization Users Show Significantly Better Results
57
58 A Central Token Solution Token Server Customer Application Customer Application Customer Application
59 A Distributed Token Solution Token Server Customer Application Customer Application Token Token Server Server Customer Application Customer Application
60 An Integrated Token Solution Customer Application Customer Application Token Server Customer Application Customer Application Token Server
61 Evaluating Different Tokenization Implementations Evaluation Area Hosted/Outsourced On-site/On-premises Evaluating Different Tokenization Implementations Area Criteria Central (old) Distributed Central (old) Distributed Integrated Operati onal Needs Pricing Model Data Types Security Availability Scalability Performance Per Server Per Transaction Identifiable - PII Cardholder - PCI Separation Compliance Scope Best Worst
62 A Central Token Solution vs. A Distributed Token Solution Dynamic Random Token Table Central Dynamic Token Table Customer Application Customer Application Customer Application Customer Application Static Random Static Static Token Random Random Static Table Token Token Random Table Table Token Table Distributed Static Distributed Token Tables Static Token Tables Static Random Static Static Token Random Random Static Table Token Token Random Table Table Token Table Distributed Static Distributed Token Tables Static Token Tables Customer Application Customer Application Customer Application Customer Application
63 A Distributed Token Solution An Integrated Token Solution Static Random Static Token Static Random Token Static Table Random Token Table Random Table Token Table Distributed Static Distributed Token Tables Static Token Tables Customer Application Customer Application Static Random Token Static Static Table Random Token Random Table Token Table Customer Application Customer Application Static Token Tables Integrated with Pep-Server Static Random Static Token Static Random Token Static Table Random Token Table Random Table Token Table Distributed Static Distributed Token Tables Static Token Tables Customer Application Customer Application Static Random Token Static Static Table Random Token Random Table Token Table Static Token Tables Integrated with PepServer Customer Application Customer Application
64 Choose Your Defenses Strengths & Weakness * * * Best Worst * Compliant to PCI DSS 1.2 for making PAN unreadable Source: 2009 Protegrity Survey
65 An Enterprise View of Different Protection Options Evaluation Criteria Strong Encryption Formatted Encryption Token Disconnected environments Distributed environments Performance impact when loading data Transparent to applications Expanded storage size Transparent to databases schema Long life-cycle data Unix or Windows mixed with big iron (EBCDIC) Easy re-keying of data in a data flow High risk data Security - compliance to PCI, NIST Best Worst
66 Deploy Defenses Matching Data Protection Solutions with Risk Level Data Field Risk Level Credit Card Number 25 Social Security Number 20 CVV 20 Customer Name 12 Secret Formula 10 Employee Name 9 Employee Health Record 6 Zip Code 3 Risk Level Low Risk (1-5) At Risk (6-15) High Risk (16-25) Solution Monitor Monitor, mask, access control limits, format control encryption Replacement, strong encryption
67 Data Protection Implementation Layers System Layer Performance Transparency Security Application Database File System Topology Performance Scalability Security Local Service Remote Service Best Worst
68 Crunch the Numbers Conclusion Risk-adjusted data security plans are cost effective Switching focus to a holistic view rather than security silo methodology Understanding of where data resides usually results in a project to reduce the number of places where sensitive data is stored Protect the remaining sensitive data with a comprehensive data protection solution
69 Managing encryption keys across different platforms
70 Deployment Applications RACF DB2 Files Encryption Solution ICSF Hardware Security Module Mainframe z/os DB2 UDB Informix Central Key Manager System i Hardware Security Module Oracle
71 Example - Centralized Data Protection Approach Secure Archive Secure Storage Database Protector Secure Distribution File System Protector Policy & Key Creation Policy Secure Usage Enterprise Data Security Administrator Audit Log Secure Collection Application Protector Auditing & Reporting Big Iron Protector
72 Protegrity Value Proposition Protegrity delivers, application, database, file protectors across all major enterprise platforms. Protegrity s Risk Adjusted Data Security Platform continuously secures data throughout its lifecycle. Underlying foundation for the platform includes comprehensive data security policy, key management, and audit reporting. Enables customers to achieve data security compliance (PCI, HIPAA, PEPIDA, SOX and Federal & State Privacy Laws)
73 Please contact us for more information Ulf Mattsson Phone [email protected]
Database Security Solutions in Cloud and Outsourced Environments
Database Security Solutions in Cloud and Outsourced Environments Ulf Mat t sson TCO Prot egri t y ul f. mat t sson AT prot egri t y. com Ulf Mattsson 20 years with IBM Development & Global Services Inventor
Data Breaches Gone Mad. Straight Away! Wednesday September 28 th, 2011
Data Breaches Gone Mad Learn how to Secure your Data Warehouse Straight Away! Wednesday September 28 th, 2011 Martin Willcox Director Product & Solutions Marketing Teradata Europe, Middle East & Africa
Securing Data Today. Ulf Mattsson CTO Protegrity ulf.mattsson [at] protegrity.com
Securing Data Today and in the Future Ulf Mattsson CTO Protegrity ulf.mattsson [at] protegrity.com Ulf Mattsson 20 years with IBM Development & Global Services Inventor of 22 patents Encryption and Tokenization
Get More for Less: Enhance Data Security and Cut Costs
Get More for Less: Enhance Data Security and Cut Costs Ulf Mattsson, CTO, Protegrity Corporation Dominic Dougherty, Protegrity Technical Support Agenda PCI DSS and State Legislation Different data protection
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Protegrity Data Security Platform
Protegrity Data Security Platform The Protegrity Data Security Platform design is based on a hub and spoke deployment architecture. The Enterprise Security Administrator (ESA) enables the authorized Security
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Data-Centric Security vs. Database-Level Security
TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides
Data-Centric security and HP NonStop-centric ecosystems. Andrew Price, XYPRO Technology Corporation Mark Bower, Voltage Security
Title Data-Centric security and HP NonStop-centric ecosystems A breakthrough strategy for neutralizing sensitive data against advanced threats and attacks Andrew Price, XYPRO Technology Corporation Mark
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance
An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Is the PCI Data Security Standard Enough?
Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard
Practical Advice for Cloud Data Protection
Practical Advice for Cloud Data Protection Ulf Mattsson CTO, Protegrity [email protected] Ulf Mattsson, Protegrity CTO Cloud Security Alliance (CSA) PCI Security Standards Council Cloud & Virtualization
PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Comprehensive Approach to Database Security
Comprehensive Approach to Database Security [email protected] NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Why Add Data Masking to Your IBM DB2 Application Environment
Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy
Josiah Wilkinson Internal Security Assessor. Nationwide
Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP
Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud - Practical advice for cloud data security Ulf Mattsson CTO, Protegrity [email protected] Ulf Mattsson, Protegrity CTO Cloud Security Alliance
New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010
New HIPAA Breach Notification Rule: Know Your Responsibilities Loudoun Medical Group Spring 2010 Health Information Technology for Economic and Clinical Health Act (HITECH) As part of the Recovery Act,
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr.
Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches Gerard M. Stegmaier [email protected] @1sand0slawyer Data Breach Trends 2011 Average Loss to Organization = $5.5 million
Protegrity Tokenization
Securing Sensitive Data for PCI, HIPAA and Other Data Security Initiatives 2011 Edition Who should read it System architects, security experts, and other IT professionals who are looking to use tokenization
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
Encrypting Sensitive Data in Oracle E-Business Suite
Encrypting Sensitive Data in Oracle E-Business Suite December 19, 2013 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
HIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates [email protected]
HIPAA and HITECH Compliance Simplification Sol Cates CSO @solcates [email protected] Quick Agenda Why comply? What does Compliance look like? New Cares vs Rental Cars vs Custom Cars Vormetric Q&A Slide
End-to-end Encryption for E-Commerce Payments using Voltage SecureData Web
Technical Brief using Voltage SecureData Web Introduction Today, merchants accepting card-not-present payments on the web are concerned about three major issues affecting their business with respect to
Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600
Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle
Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide
Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide. Four steps for success Implementing a Data Loss Prevention solution to address PCI requirements may be broken into four key
All Things Oracle Database Encryption
All Things Oracle Database Encryption January 21, 2016 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda Database Encryption
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms v2.18.11, rev 1 Presenters Joseph DeMarco, Partner DeVore & DeMarco, LLP Lauren Shy, Assistant General Counsel Fragomen,
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
What s New in PCI DSS 2.0. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1
What s New in PCI DSS 2.0 2010 Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1 Agenda PCI Overview PCI 2.0 Changes PCI Advanced Technology Update PCI Solutions 2010 Cisco and/or
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Feature. Log Management: A Pragmatic Approach to PCI DSS
Feature Prakhar Srivastava is a senior consultant with Infosys Technologies Ltd. and is part of the Infrastructure Transformation Services Group. Srivastava is a solutions-oriented IT professional who
Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations
Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased
Real-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Sales Rep Frequently Asked Questions
V 02.21.13 Sales Rep Frequently Asked Questions OMEGA Processing Data Protection Program February 2013 - Updated In response to a national rise in data breaches and system compromises, OMEGA Processing
Auditing Data Access Without Bringing Your Database To Its Knees
Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
PCI Compliance in Oracle E-Business Suite
PCI Compliance in Oracle E-Business Suite May 14, 2015 Mike Miller Chief Security Officer Integrigy Corporation David Kilgallon Oracle Integration Manager CardConnect Moderated by Phil Reimann, Director
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Complete Database Security. Thomas Kyte http://asktom.oracle.com/
Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Virtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
