SlideShare a Scribd company logo
PCI Change Detection: Thinking Beyond the Checkbox
Glenn Rogers
CIO
Girl Scouts of
Northern California
Tim Erlin
Dir. IT Risk and
Security Strategist
Tripwire
PCI Change Detection: Thinking Beyond the Checkbox
PCI Change Detection: Thinking Beyond the Checkbox
PCI Change Detection: Thinking Beyond the Checkbox
PCI Change Detection: Thinking Beyond the Checkbox
PCI Change Detection: Thinking Beyond the Checkbox
PCI Change Detection: Thinking Beyond the Checkbox
1: Build and
Maintain a
Secure Network
2: Protect
Cardholder Data
3: Maintain a
Vulnerability
Management
Program
4: Implement
Strong Access
Control Measures
5: Regularly
Monitor and Test
Networks
6: Maintain an
Information
Security Policy
Requirement 1:
Install and maintain
a firewall
configuration to
Protect Cardholder
Data
Requirement 3:
Protect stored
cardholder data
Requirement 5:
Protect all systems
against malware and
regularly update anti-
virus software or
programs
Requirement 7:
Restrict access to
cardholder data by
business need to
know
Requirement 10:
Track and monitor
all access to
network resources
and cardholder
data
Requirement 12:
Maintain a policy that
addresses information
security for all
personnel
Requirement 2:
Do not use vendor-
supplied defaults for
system passwords
and other security
parameters
Requirement 4:
Encrypt transmission
of cardholder data
across open, public
networks
Requirement 6:
Develop and maintain
secure systems and
applications
Requirement 8:
Identify and
authenticate access
to system
components
Requirement 11:
Regularly test
security systems
and processes
Requirement 9:
Restrict physical
access to cardholder
data
Validates
Provides
Supports
PCI Change Detection: Thinking Beyond the Checkbox
Tripwire and PCI DSS 3.2
Continuous Monitoring
Risk Reduction
Threat Detection and Response
Operational Cost Reduction
INTEGRATION
AUTOM
ATION
CONTEXT
PCI Change Detection: Thinking Beyond the Checkbox
PCI Change Detection: Thinking Beyond the Checkbox

More Related Content

PPTX
Taking the Pain out of PCI Compliance
PPTX
Payment Card Industry Compliance Requirements
PDF
DataPower as PCI
PPT
WE16 - Defense in Depth: Top 10 Critical Security Controls
PDF
2017 IT Control Environment for Local Gov
PPTX
OWASP Nagpur Meet #4
PPTX
Network Security
PDF
Understanding the Experian independent third party assessment (EI3PA ) requir...
Taking the Pain out of PCI Compliance
Payment Card Industry Compliance Requirements
DataPower as PCI
WE16 - Defense in Depth: Top 10 Critical Security Controls
2017 IT Control Environment for Local Gov
OWASP Nagpur Meet #4
Network Security
Understanding the Experian independent third party assessment (EI3PA ) requir...

What's hot (20)

PPT
PDF
Pervasive Security Across Your Extended Network
PPT
Security Readiness Profile
PPTX
Security Essentials
PDF
Cyber essentials-overview-sep-2021-211019100139
PDF
Brian Starr Cover Letter
PPTX
6 Steps to Secure Network Devices
PDF
Fire walls
PPTX
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
PDF
Michael jarmark internet security basics
PPTX
IoT Threat Intel - Steppa
PDF
Info and telecom_network_security
PPT
Telkom Sigma Software Security System v1
PDF
Midsize Business Solutions: Cybersecurity
PDF
mcq edu03 Anju 23.pdf
DOC
Mohammed imranuddin cv.DOC
PDF
Edu 03Anju 23 assignment.pdf
PPTX
PCI Compliance Myths, Reality and Solutions for Retail
PPTX
What is the UK Cyber Essentials scheme?
PDF
New VIPRE_DS_EndpointSecurity_2016
Pervasive Security Across Your Extended Network
Security Readiness Profile
Security Essentials
Cyber essentials-overview-sep-2021-211019100139
Brian Starr Cover Letter
6 Steps to Secure Network Devices
Fire walls
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Michael jarmark internet security basics
IoT Threat Intel - Steppa
Info and telecom_network_security
Telkom Sigma Software Security System v1
Midsize Business Solutions: Cybersecurity
mcq edu03 Anju 23.pdf
Mohammed imranuddin cv.DOC
Edu 03Anju 23 assignment.pdf
PCI Compliance Myths, Reality and Solutions for Retail
What is the UK Cyber Essentials scheme?
New VIPRE_DS_EndpointSecurity_2016
Ad

Viewers also liked (20)

PPTX
Leveraging Change Control for Security
PPTX
Tripwire University Boot Camp – Economy of Bad
PPTX
Tripwire University Boot Camp – The Shifting Landscape: Know Your Battlefield
PPTX
Survival of the Fittest: How to Build a Cyber Resilient Organization
PPTX
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
PPTX
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
PPTX
8 Tips on Creating a Security Culture in the Workplace
PPTX
Threat Intelligence from Honeypots for Active Defense
PPTX
"Backoff" Malware: How to Know If You're Infected
PDF
Keep Your Guard: Stay Compliant and Be Secure
PPTX
An Essential Guide to EU GDPR
PPTX
Achieving Continuous Monitoring with Security Automation
PPTX
Tripwire IP360 Vulnerability Management
PPTX
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
PPTX
Breaking In and Breaking Records – A Look Back at 2016 Cybercrimes
PDF
How to Protect Your Organization from the Ransomware Epidemic
PPTX
Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
PPTX
Overload: Critical Lessons from 15 Years of ICS Vulnerabilities
PPTX
3 Success Stories on the Tripwire Enterprise Journey
PDF
Industry Insights from Infosecurity Europe 2016
Leveraging Change Control for Security
Tripwire University Boot Camp – Economy of Bad
Tripwire University Boot Camp – The Shifting Landscape: Know Your Battlefield
Survival of the Fittest: How to Build a Cyber Resilient Organization
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
8 Tips on Creating a Security Culture in the Workplace
Threat Intelligence from Honeypots for Active Defense
"Backoff" Malware: How to Know If You're Infected
Keep Your Guard: Stay Compliant and Be Secure
An Essential Guide to EU GDPR
Achieving Continuous Monitoring with Security Automation
Tripwire IP360 Vulnerability Management
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Breaking In and Breaking Records – A Look Back at 2016 Cybercrimes
How to Protect Your Organization from the Ransomware Epidemic
Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
Overload: Critical Lessons from 15 Years of ICS Vulnerabilities
3 Success Stories on the Tripwire Enterprise Journey
Industry Insights from Infosecurity Europe 2016
Ad

Similar to PCI Change Detection: Thinking Beyond the Checkbox (20)

PDF
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
PPTX
Stay Ahead of Threats with Advanced Security Protection - Fortinet
PPTX
Guidelines on Cyber Security in Power Sector 2021_R.pptx
DOCX
1. Written assignmentscommunication must demonstrate professional.docx
PPTX
Scrapping for Pennies: How to implement security without a budget
PDF
Cisco Live Cancun PR Session
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
DOCX
Performance MNIST Special Publicatio.docx
PDF
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
PPT
CCNA Security - Chapter 1
PDF
What is expected from an organization under NCA ECC Compliance?
PDF
Cloud native patterns antipatterns
PPTX
Information security principles
PDF
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
PDF
National Institute of Standards and Technology (NIST) checklist
PDF
NIST Cybersecurity Framework building a checklist.pdf
PPTX
Information Systems Policy
PPT
RiskWatch for Credit Unions™
DOCX
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
PPTX
DojoSec FISMA Presentation
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Guidelines on Cyber Security in Power Sector 2021_R.pptx
1. Written assignmentscommunication must demonstrate professional.docx
Scrapping for Pennies: How to implement security without a budget
Cisco Live Cancun PR Session
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Performance MNIST Special Publicatio.docx
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
CCNA Security - Chapter 1
What is expected from an organization under NCA ECC Compliance?
Cloud native patterns antipatterns
Information security principles
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
National Institute of Standards and Technology (NIST) checklist
NIST Cybersecurity Framework building a checklist.pdf
Information Systems Policy
RiskWatch for Credit Unions™
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
DojoSec FISMA Presentation

More from Tripwire (20)

PDF
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
PDF
Data Privacy Day 2022: Tips to Ensure Data Privacy
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PPTX
Tripwire Energy Working Group: TIV Demo
PPTX
Tripwire Energy Working Group Session w/Dale Peterson
PPTX
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
PPTX
Tripwire Energy Working Group: Customer Session with Chase Cole
PPTX
Tripwire Energy Working Group: Keynote w/Patrick Miller
PDF
World Book Day: Cybersecurity’s Quietest Celebration
PDF
Tripwire Retail Security 2020 Survey: Key Findings
PDF
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
PDF
The Adventures of Captain Tripwire: Coloring Book!
PDF
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
PDF
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
PDF
Tripwire 2019 Skills Gap Survey: Key Findings
PDF
A Look Back at 2018: The Most Memorable Cyber Moments
PPTX
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
PDF
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
PPTX
Defend Your Data Now with the MITRE ATT&CK Framework
PPTX
Defending Critical Infrastructure Against Cyber Attacks
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Data Privacy Day 2022: Tips to Ensure Data Privacy
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Keynote w/Patrick Miller
World Book Day: Cybersecurity’s Quietest Celebration
Tripwire Retail Security 2020 Survey: Key Findings
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
The Adventures of Captain Tripwire: Coloring Book!
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
Tripwire 2019 Skills Gap Survey: Key Findings
A Look Back at 2018: The Most Memorable Cyber Moments
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Defend Your Data Now with the MITRE ATT&CK Framework
Defending Critical Infrastructure Against Cyber Attacks

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Machine Learning_overview_presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Electronic commerce courselecture one. Pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
Assigned Numbers - 2025 - Bluetooth® Document
Agricultural_Statistics_at_a_Glance_2022_0.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation_ Review paper, used for researhc scholars
Programs and apps: productivity, graphics, security and other tools
Machine Learning_overview_presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
Dropbox Q2 2025 Financial Results & Investor Presentation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Electronic commerce courselecture one. Pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Weekly Chronicles - August'25-Week II
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence

PCI Change Detection: Thinking Beyond the Checkbox

  • 2. Glenn Rogers CIO Girl Scouts of Northern California Tim Erlin Dir. IT Risk and Security Strategist Tripwire
  • 9. 1: Build and Maintain a Secure Network 2: Protect Cardholder Data 3: Maintain a Vulnerability Management Program 4: Implement Strong Access Control Measures 5: Regularly Monitor and Test Networks 6: Maintain an Information Security Policy Requirement 1: Install and maintain a firewall configuration to Protect Cardholder Data Requirement 3: Protect stored cardholder data Requirement 5: Protect all systems against malware and regularly update anti- virus software or programs Requirement 7: Restrict access to cardholder data by business need to know Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 12: Maintain a policy that addresses information security for all personnel Requirement 2: Do not use vendor- supplied defaults for system passwords and other security parameters Requirement 4: Encrypt transmission of cardholder data across open, public networks Requirement 6: Develop and maintain secure systems and applications Requirement 8: Identify and authenticate access to system components Requirement 11: Regularly test security systems and processes Requirement 9: Restrict physical access to cardholder data Validates Provides Supports
  • 11. Tripwire and PCI DSS 3.2
  • 12. Continuous Monitoring Risk Reduction Threat Detection and Response Operational Cost Reduction INTEGRATION AUTOM ATION CONTEXT