SlideShare a Scribd company logo
1EMC CONFIDENTIAL—INTERNAL USE ONLY
RSA Archer PCI Compliance
Management
RSA Archer Focused Solutions Webcast
Clifford Huntington – RSA Archer Product Management
2EMC CONFIDENTIAL—INTERNAL USE ONLY
Business Challenges and Issues
Proliferation of
credit cards
has increased
the potential
for fraudulent
transactions
Many parties
involved in the
payment
process
Numerous
entry points for
access and
misuse of
credit card
data
Failure to
comply can
result in fines,
withdrawal
from card
programs,
greater
operational
costs and
potential
reputational
damage
Costs
associated
with gaining &
maintaining
PCI
compliance
can be
substantial
Organizations
have realized
that PCI
compliance
must be a
continuous
assessment
effort and not a
point in time
exercise
Payment Card
Industry (PCI)
program has
placed
significant
pressure on
businesses to
establish
enterprise-
grade security
programs
PCI Data is Both a
Benefit and Liability
for Organizations
3EMC CONFIDENTIAL—INTERNAL USE ONLY
Storage of Personal Card Data is a Common Practice
Recent Survey of Businesses in the U.S. and Europe
81%
73%
71%
57%
16%
Store Payment Card Numbers
Store Payment Card Expiration Dates
Store Payment Card Verification Codes
Store Magnetic Data from the
Payment Card Magnetic Strip
Store Other Personal Data
Common
Business
Practices
That Put
Cardholder
Data at Risk
Source: Forrester Research – The State of PCI Compliance (commissioned by RSA/EMC)
4EMC CONFIDENTIAL—INTERNAL USE ONLY
RSA Archer PCI Compliance Management Process
ID
Cardholder
Data Flows
Determine
Scope
ID &
Implement
Controls
Gather
Evidence
Review
Controls
/
Complete
SAQ
Remediate
Complete
Validation
Requirements
Submit
Validation
Requirements
5EMC CONFIDENTIAL—INTERNAL USE ONLY
PCI Compliance Value Proposition
Business Benefits of RSA Archer PCI Solution
Pre-Configured
Solution
Efficiency
Visibility
Scalability
• Jumpstart PCI Compliance Program
• Pre-written Policies, Standards, Procedures & Assessments
• Streamlines the compliance process
• Automates assessments
• Reduces test & maintenance costs
• Integrates with broader RSA GRC solutions
• Easily add additional solutions as business requirements grow
• Real-time visibility into the state of organizational PCI compliance
• Powerful executive dashboards & reports
6EMC CONFIDENTIAL—INTERNAL USE ONLY
eGRC Platform
Policy
Management
Enterprise
Management
Compliance
Management
PCI Compliance Management
Cardholder Data
Environments
PCI Compliance
Projects
Reports on
Compliance
PCI Compliance Component Layout
7EMC CONFIDENTIAL—INTERNAL USE ONLY
 Define your Cardholder Data Environment, Deploy Control Self
Assessments, schedule ongoing compliance activities integrate technical
compliance tools, manage issues, exceptions and remediation actions.
Capture Evidence
Schedule Ongoing
Compliance Assessments
Document Your Control
Framework
Report on Overall
Compliance
Manage Issues,
Exceptions and
Remediations
Define your Cardholder
Data Environment
How We Do It
8EMC CONFIDENTIAL—INTERNAL USE ONLY
Time to
Prepare
Compliance
Metrics and
Reports
# PCI
Requirements
Met
Reduced Time
to Measure
Compliance
with New
Versions
# Closed
Findings
Cost of
Regulatory
Audit Fines
Measuring Your Success
Before we managed work in two or three places.
With RSA Archer, we have one place to manage all of
our work. People are completing assessments and
migrating risk, not focusing on administrative tasks.
“ “
9EMC CONFIDENTIAL—INTERNAL USE ONLY
Product Demonstration
10EMC CONFIDENTIAL—INTERNAL USE ONLY
Questions & Answers
11© Copyright 2011 EMC Corporation. All rights reserved.
Upcoming RSA Archer Webcasts
• Aug 8 at 11ET: ACI/AIMS/Archer/Security Analytics
• Register on the RSA public website or Archer Community
http://www.emc.com/campaign/global/rsa/rsa-webcast.htm
• Webcast replays are also on public website or Community
12© Copyright 2011 EMC Corporation. All rights reserved.
THANK YOU

More Related Content

PPTX
Rsa archer training
PDF
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
PDF
ITAM Tools Day, November 2015 - ITAM Review
PDF
Flexera Software Tools Day 2015
PPTX
SAP Governance,Risk and Compliance
PPTX
Salesforce Security Review Tips and Tricks
PDF
081712 isaca-atl-auditing sap-grc
PDF
brainwaregroup ITAM Review Tools Day Presentation 2015
Rsa archer training
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
ITAM Tools Day, November 2015 - ITAM Review
Flexera Software Tools Day 2015
SAP Governance,Risk and Compliance
Salesforce Security Review Tips and Tricks
081712 isaca-atl-auditing sap-grc
brainwaregroup ITAM Review Tools Day Presentation 2015

What's hot (20)

PDF
ITAM Tools Day, November 2015 - Concorde
PPTX
Pg presentation for steph
PDF
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
PDF
8MANOverview
PDF
Iia los angeles sap security presentation
PPTX
Ewug 1811 break the glass
PDF
Microsoft audit defence gotchas check list
PPT
Isms3
PPT
Isms4
PDF
Are you the next sitting duck that will be moved to the Oracle Cloud as a res...
PPTX
Network security in Chennai
PDF
Why your works council has nothing to fear from SAP security. [Webinar]
PDF
Effective Cyber Security – the difference between “point in time” and “period...
PDF
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
PPTX
Identity Management: Front and Center for Healthcare Providers
PPTX
Quest One Identity Management Summary
PDF
SAST Authorization Management: How to integrate your SoD analysis into the SA...
PDF
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
PDF
Communication & making your ITAM strategy stick Workshop: Barbara Scott, Pres...
PDF
Microsoft audit defence entitlement check list
ITAM Tools Day, November 2015 - Concorde
Pg presentation for steph
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
8MANOverview
Iia los angeles sap security presentation
Ewug 1811 break the glass
Microsoft audit defence gotchas check list
Isms3
Isms4
Are you the next sitting duck that will be moved to the Oracle Cloud as a res...
Network security in Chennai
Why your works council has nothing to fear from SAP security. [Webinar]
Effective Cyber Security – the difference between “point in time” and “period...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
Identity Management: Front and Center for Healthcare Providers
Quest One Identity Management Summary
SAST Authorization Management: How to integrate your SoD analysis into the SA...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
Communication & making your ITAM strategy stick Workshop: Barbara Scott, Pres...
Microsoft audit defence entitlement check list
Ad

Similar to A systematic approach to pci compliance using rsa archer (20)

PDF
PCI Certification and remediation services
PPT
eCommerce Summit Atlanta Mountain Media
PPT
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
PPT
Evolution Pci For Pod1
PDF
PCI-DSS for IDRBT
PDF
PCI DSS Implementation: A Five Step Guide
PPT
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
PPTX
Educause+PCI+briefing+4-19-20162345.pptx
PDF
IT Security and Risk Management - Visionet Systems
PPTX
PCI PIN Security & Key Management Compliance
PPTX
Secrets for Successful Regulatory Compliance Projects
PPT
Information Security Program & PCI Compliance Planning for your Business
PDF
Tripwire PCI Customer Success Stories
PPTX
Managing Multiple Assessments Using Zero Trust Principles
PPTX
Payment card industry data security standard
PDF
Whitepaper - Application Delivery in PCI DSS Compliant Environments
PDF
Credit Card Processing for Small Business
PDF
Reduce PCI Scope - Maximise Conversion - Whitepaper
PPTX
Vendor Management for PCI DSS, HIPAA, and FFIEC
PPT
PCI DSS
PCI Certification and remediation services
eCommerce Summit Atlanta Mountain Media
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
Evolution Pci For Pod1
PCI-DSS for IDRBT
PCI DSS Implementation: A Five Step Guide
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Educause+PCI+briefing+4-19-20162345.pptx
IT Security and Risk Management - Visionet Systems
PCI PIN Security & Key Management Compliance
Secrets for Successful Regulatory Compliance Projects
Information Security Program & PCI Compliance Planning for your Business
Tripwire PCI Customer Success Stories
Managing Multiple Assessments Using Zero Trust Principles
Payment card industry data security standard
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Credit Card Processing for Small Business
Reduce PCI Scope - Maximise Conversion - Whitepaper
Vendor Management for PCI DSS, HIPAA, and FFIEC
PCI DSS
Ad

Recently uploaded (20)

PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
DOCX
Euro SEO Services 1st 3 General Updates.docx
DOCX
Business Management - unit 1 and 2
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PPTX
5 Stages of group development guide.pptx
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Types of control:Qualitative vs Quantitative
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPT
Chapter four Project-Preparation material
PDF
IFRS Notes in your pocket for study all the time
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPT
Data mining for business intelligence ch04 sharda
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Euro SEO Services 1st 3 General Updates.docx
Business Management - unit 1 and 2
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
WRN_Investor_Presentation_August 2025.pdf
DOC-20250806-WA0002._20250806_112011_0000.pdf
5 Stages of group development guide.pptx
Probability Distribution, binomial distribution, poisson distribution
Types of control:Qualitative vs Quantitative
unit 1 COST ACCOUNTING AND COST SHEET
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Power and position in leadershipDOC-20250808-WA0011..pdf
Chapter four Project-Preparation material
IFRS Notes in your pocket for study all the time
Ôn tập tiếng anh trong kinh doanh nâng cao
Data mining for business intelligence ch04 sharda

A systematic approach to pci compliance using rsa archer

  • 1. 1EMC CONFIDENTIAL—INTERNAL USE ONLY RSA Archer PCI Compliance Management RSA Archer Focused Solutions Webcast Clifford Huntington – RSA Archer Product Management
  • 2. 2EMC CONFIDENTIAL—INTERNAL USE ONLY Business Challenges and Issues Proliferation of credit cards has increased the potential for fraudulent transactions Many parties involved in the payment process Numerous entry points for access and misuse of credit card data Failure to comply can result in fines, withdrawal from card programs, greater operational costs and potential reputational damage Costs associated with gaining & maintaining PCI compliance can be substantial Organizations have realized that PCI compliance must be a continuous assessment effort and not a point in time exercise Payment Card Industry (PCI) program has placed significant pressure on businesses to establish enterprise- grade security programs PCI Data is Both a Benefit and Liability for Organizations
  • 3. 3EMC CONFIDENTIAL—INTERNAL USE ONLY Storage of Personal Card Data is a Common Practice Recent Survey of Businesses in the U.S. and Europe 81% 73% 71% 57% 16% Store Payment Card Numbers Store Payment Card Expiration Dates Store Payment Card Verification Codes Store Magnetic Data from the Payment Card Magnetic Strip Store Other Personal Data Common Business Practices That Put Cardholder Data at Risk Source: Forrester Research – The State of PCI Compliance (commissioned by RSA/EMC)
  • 4. 4EMC CONFIDENTIAL—INTERNAL USE ONLY RSA Archer PCI Compliance Management Process ID Cardholder Data Flows Determine Scope ID & Implement Controls Gather Evidence Review Controls / Complete SAQ Remediate Complete Validation Requirements Submit Validation Requirements
  • 5. 5EMC CONFIDENTIAL—INTERNAL USE ONLY PCI Compliance Value Proposition Business Benefits of RSA Archer PCI Solution Pre-Configured Solution Efficiency Visibility Scalability • Jumpstart PCI Compliance Program • Pre-written Policies, Standards, Procedures & Assessments • Streamlines the compliance process • Automates assessments • Reduces test & maintenance costs • Integrates with broader RSA GRC solutions • Easily add additional solutions as business requirements grow • Real-time visibility into the state of organizational PCI compliance • Powerful executive dashboards & reports
  • 6. 6EMC CONFIDENTIAL—INTERNAL USE ONLY eGRC Platform Policy Management Enterprise Management Compliance Management PCI Compliance Management Cardholder Data Environments PCI Compliance Projects Reports on Compliance PCI Compliance Component Layout
  • 7. 7EMC CONFIDENTIAL—INTERNAL USE ONLY  Define your Cardholder Data Environment, Deploy Control Self Assessments, schedule ongoing compliance activities integrate technical compliance tools, manage issues, exceptions and remediation actions. Capture Evidence Schedule Ongoing Compliance Assessments Document Your Control Framework Report on Overall Compliance Manage Issues, Exceptions and Remediations Define your Cardholder Data Environment How We Do It
  • 8. 8EMC CONFIDENTIAL—INTERNAL USE ONLY Time to Prepare Compliance Metrics and Reports # PCI Requirements Met Reduced Time to Measure Compliance with New Versions # Closed Findings Cost of Regulatory Audit Fines Measuring Your Success Before we managed work in two or three places. With RSA Archer, we have one place to manage all of our work. People are completing assessments and migrating risk, not focusing on administrative tasks. “ “
  • 9. 9EMC CONFIDENTIAL—INTERNAL USE ONLY Product Demonstration
  • 10. 10EMC CONFIDENTIAL—INTERNAL USE ONLY Questions & Answers
  • 11. 11© Copyright 2011 EMC Corporation. All rights reserved. Upcoming RSA Archer Webcasts • Aug 8 at 11ET: ACI/AIMS/Archer/Security Analytics • Register on the RSA public website or Archer Community http://www.emc.com/campaign/global/rsa/rsa-webcast.htm • Webcast replays are also on public website or Community
  • 12. 12© Copyright 2011 EMC Corporation. All rights reserved. THANK YOU