SlideShare a Scribd company logo
The Difference Between Being Secure And Being CompliantJohn Bedrick - AccuCode
AgendaAbout AccuCodeWhich is Worse?Unlocking the Security TaxonomySecurity versus ComplianceHow much security is enough?  What happens if ……. ?Closing ThoughtsAO:ComplianceNext StepsQuestions and Answers
  AccuCode the CompanyFounded 1995
VAR, Professional & Managed Services, Commercial Software Products
National leader in: retail systems,security & compliance, wireless networking, mobile computing, bar code & RFID technologies
Fastest Growing Privately Held Company in the U.S.
Trusted Advisor Delivering Guaranteed Outcomes   AccuCode Customers & PartnersPartnersManufacturingRetailTransportationAccuCode has hundreds of customers & thousands of end-users!
Which is Worse?Illusion versus Reality
Unlocking the Security TaxonomyPEOPLE
Security Versus Compliance   (NOT a complete list)
How Much Security Is Enough?Step 1 – Determine the Assets you need to protect.Step 2 – Determine how much those Assets are worth (to you and someone else)Step 3 – Determine the level of Risk you are willing to live with.Step 4 – Decide how much you are willing to spend to protect those Assets, based on the level of Risk you have determined to accept.Step 5 – Implement Security measures based on above.  (Answer: It’s never enough!)Step 6 – Repeat as often as needed or whenever things change.MalwareRootkitsHackersTrojansPhishingVirusesSpywareBot NetsAdwareWormsSocial EngineeringSpam
What Happens If…..?you have a breach and you were compliant; but, not “secure”?Determined on a case-by-case basis and also State-specific privacy laws.someone breaks into your business and steals your servers and/or back-up systems (drives, tapes, paper records, etc…)?Were appropriate protection measures being used at the time?  Disaster recovery?your phone or mobile device (e.g., tablet) is lost or stolen?Is there sensitive data stored on the phone/device?  Can you remote “wipe” it?a “vendor” is at fault?Did you “check out” the vendor and double-check their work?an employee is “duped” (social engineering) or assists a criminal?Was the employee trained in the proper policies and procedures?Did you “hire right” and the employee “checked out” prior to hiring?there was nothing more that could’ve been done – it just happened?There’s always more that could be done.Did you determine the appropriate level of risk and secure appropriately?
Closing ThoughtsSecurity is a journey; not, a destination.  But it’s also a race.Implementing proper levels of security require careful analysis of risk versus implementation.Well thought out security requires layers of protection all working together.There are NO guarantees for being 100% secure.Being PCI compliant is far better then not being compliantit’s a step in the right direction for becoming more secure.Hire reputable security/compliance experts to help you.Don’t get into a position of the “blind leading the blind”.
ANDNext Steps

More Related Content

PDF
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
PDF
Preserving the Privilege during Breach Response
PDF
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
PPSX
William Diederich - Security Certifications: Are They Worth the Investment? A...
PPT
Cloud Computing Panel - NYCLA
PDF
Industry Insights from Infosecurity Europe 2016
PDF
Silicon Valley top 20
PPTX
Mobility Security - A Business-Centric Approach
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Preserving the Privilege during Breach Response
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
William Diederich - Security Certifications: Are They Worth the Investment? A...
Cloud Computing Panel - NYCLA
Industry Insights from Infosecurity Europe 2016
Silicon Valley top 20
Mobility Security - A Business-Centric Approach

What's hot (10)

PDF
Less tech more talk the future of the ciso role
PDF
Security Awareness: The Best Defence
PDF
Securing Medical Devices Using Adaptive Testing Methodologies
PDF
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LR
PPTX
Cyber security
PPTX
Info sec for startups
PDF
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
PDF
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
PDF
Netflix SIRT - Culture and Tech -Trainman
PDF
Reality of cybersecurity 11.4.2017
Less tech more talk the future of the ciso role
Security Awareness: The Best Defence
Securing Medical Devices Using Adaptive Testing Methodologies
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LR
Cyber security
Info sec for startups
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
Netflix SIRT - Culture and Tech -Trainman
Reality of cybersecurity 11.4.2017
Ad

Similar to The Difference Between Being Secure And Being Compliant (20)

PPTX
Solutions For PCI Compliance
PPTX
SANS WhatWorks - Compliance & DLP
PPT
Rothke Patchlink
PPTX
Information Security for Business Leaders - Eric Vanderburg - JurInnov
PDF
BEA Presentation
PDF
2015 09-22 Is it time for a Security and Compliance Assessment?
PPTX
Insecurity Through Technology
PPTX
Selling security to the C-level
PPTX
Managing Risk or Reacting to Compliance
PPTX
How to-become-secure-and-stay-secure
PDF
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
PPTX
Building a Security culture at Skyscanner 2016
PPTX
Chapter-Seven.pptxhmhjmhjkhjkhjkljlhjkhjkhj
PDF
PCI Compliance NOT for Dummies epb 30MAR2016
PPTX
Keynote @ ECMECC School Security Summit
PPTX
Top Cybersecurity Challenges Facing Your Business
PPTX
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
PPTX
BREACHED: Data Centric Security for SAP
PPTX
Cyber Security Landscape: Changes, Threats and Challenges
PDF
Credit Union Cyber Security
Solutions For PCI Compliance
SANS WhatWorks - Compliance & DLP
Rothke Patchlink
Information Security for Business Leaders - Eric Vanderburg - JurInnov
BEA Presentation
2015 09-22 Is it time for a Security and Compliance Assessment?
Insecurity Through Technology
Selling security to the C-level
Managing Risk or Reacting to Compliance
How to-become-secure-and-stay-secure
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Building a Security culture at Skyscanner 2016
Chapter-Seven.pptxhmhjmhjkhjkhjkljlhjkhjkhj
PCI Compliance NOT for Dummies epb 30MAR2016
Keynote @ ECMECC School Security Summit
Top Cybersecurity Challenges Facing Your Business
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
BREACHED: Data Centric Security for SAP
Cyber Security Landscape: Changes, Threats and Challenges
Credit Union Cyber Security
Ad

The Difference Between Being Secure And Being Compliant

  • 1. The Difference Between Being Secure And Being CompliantJohn Bedrick - AccuCode
  • 2. AgendaAbout AccuCodeWhich is Worse?Unlocking the Security TaxonomySecurity versus ComplianceHow much security is enough?  What happens if ……. ?Closing ThoughtsAO:ComplianceNext StepsQuestions and Answers
  • 3. AccuCode the CompanyFounded 1995
  • 4. VAR, Professional & Managed Services, Commercial Software Products
  • 5. National leader in: retail systems,security & compliance, wireless networking, mobile computing, bar code & RFID technologies
  • 6. Fastest Growing Privately Held Company in the U.S.
  • 7. Trusted Advisor Delivering Guaranteed Outcomes AccuCode Customers & PartnersPartnersManufacturingRetailTransportationAccuCode has hundreds of customers & thousands of end-users!
  • 8. Which is Worse?Illusion versus Reality
  • 9. Unlocking the Security TaxonomyPEOPLE
  • 10. Security Versus Compliance (NOT a complete list)
  • 11. How Much Security Is Enough?Step 1 – Determine the Assets you need to protect.Step 2 – Determine how much those Assets are worth (to you and someone else)Step 3 – Determine the level of Risk you are willing to live with.Step 4 – Decide how much you are willing to spend to protect those Assets, based on the level of Risk you have determined to accept.Step 5 – Implement Security measures based on above. (Answer: It’s never enough!)Step 6 – Repeat as often as needed or whenever things change.MalwareRootkitsHackersTrojansPhishingVirusesSpywareBot NetsAdwareWormsSocial EngineeringSpam
  • 12. What Happens If…..?you have a breach and you were compliant; but, not “secure”?Determined on a case-by-case basis and also State-specific privacy laws.someone breaks into your business and steals your servers and/or back-up systems (drives, tapes, paper records, etc…)?Were appropriate protection measures being used at the time? Disaster recovery?your phone or mobile device (e.g., tablet) is lost or stolen?Is there sensitive data stored on the phone/device? Can you remote “wipe” it?a “vendor” is at fault?Did you “check out” the vendor and double-check their work?an employee is “duped” (social engineering) or assists a criminal?Was the employee trained in the proper policies and procedures?Did you “hire right” and the employee “checked out” prior to hiring?there was nothing more that could’ve been done – it just happened?There’s always more that could be done.Did you determine the appropriate level of risk and secure appropriately?
  • 13. Closing ThoughtsSecurity is a journey; not, a destination. But it’s also a race.Implementing proper levels of security require careful analysis of risk versus implementation.Well thought out security requires layers of protection all working together.There are NO guarantees for being 100% secure.Being PCI compliant is far better then not being compliantit’s a step in the right direction for becoming more secure.Hire reputable security/compliance experts to help you.Don’t get into a position of the “blind leading the blind”.
  • 15. AO:Compliance Makes PCI Compliance as Easy as:
  • 16. Next Steps, If You Need HelpAccuCode and our partners are ready to assist you with getting and staying PCI Compliant
  • 17. Go to the AO:Compliance website to find out more information about our compliance and security offerings www.aocompliance.com
  • 19. If you need help with other technology issues, AccuCode can also assist you with that as well
  • 20. Visit the AccuCode website for more information about our other products and services www.accucode.com

Editor's Notes

  • #13: Assess and Analyze (This critical step will help you understand how much becoming PCI compliant will cost you!)Assess the current environmentAnalyze any gaps that may existClose the GapsRemediate gaps & problem areasGet the environment compliantStay CompliantPerform regular testing & scanningRemediate to stay compliant