SlideShare a Scribd company logo
1
1
Time to Re-think
our
Security Process
Ulf Mattsson, Chief Technology Officer, Compliance Engineering
umattsson@complianceengineers.com
www.complianceengineers.com
2
Ulf Mattsson
Inventor of more than 25 US Patents
Industry Involvement
PCI DSS - PCI Security Standards Council
• Encryption & Tokenization Task Forces, Cloud & Virtualization SIGs
IFIP - International Federation for Information Processing
• WG 11.3 Data and Application Security
CSA - Cloud Security Alliance
ANSI - American National Standards Institute
• ANSI X9 Tokenization Work Group
NIST - National Institute of Standards and Technology
• NIST Big Data Working Group
User Groups
• Security: ISSA & ISACA
• Databases: IBM & Oracle
3
My work with PCI DSS Standards
Payment Card Industry Security Standards Council (PCI SSC)
1. PCI SSC Tokenization Task Force
2. PCI SSC Encryption Task Force
3. PCI SSC Point to Point Encryption Task Force
4. PCI SSC Risk Assessment SIG
5. PCI SSC eCommerce SIG
6. PCI SSC Cloud SIG
7. PCI SSC Virtualization SIG
8. PCI SSC Pre-Authorization SIG
9. PCI SSC Scoping SIG Working Group
10. PCI SSC 2013 – 2014 Tokenization Task Force
4
5
Encryption Usage - Mature vs. Immature Companies
Source: Ponemon - Encryption Application Trends Study • June 2016
Lessuseofencryption
Do we
know our
sensitive
data?
Big
Data
Public
Cloud
6
Not Knowing Where Sensitive Data Is
Source: The State of Data Security Intelligence, Ponemon Institute, 2015
7
Not Managing Risks to Sensitive Data
Source: The State of Data Security Intelligence, Ponemon Institute, 2015
Access Patterns
Data Discovery
Data Access
8
9
Cloud Providers Not Becoming Security Vendors
• There is great demand for security providers that can offer
orchestration of security policy and controls that span not just
multicloud environments but also extend to on-premises
infrastructure
• Customers are starting to realize that the responsibility for mitigating
risks associated with user behavior lies with them and not the
CSP — driving them to evaluate a strategy that allows for incident
detection, response and remediation capabilities in cloud
environments
Source: Gartner: Market Trends: Are Cloud Providers Becoming Security Vendors? , May 2016
10
• Centrally managed security policy
• Across unstructured and structured silos
• Classify data, control access and monitoring
• Protection – encryption, tokenization and masking
• Segregation of duties – application users and privileged users
• Auditing and reporting
2014: Data–Centric Audit and Protection (DCAP)
Source: Gartner – Market Guide for Data – Centric Audit and Protection (DCAP), Nov 21 2014
11
• IT risk and security leaders must move from trying to prevent
every threat and acknowledge that perfect protection is not
achievable.
• Organizations need to detect and respond to malicious
behaviors and incidents, because even the best preventative
controls will not prevent all incidents.
• By 2020, 60% of enterprise information security budgets will be
allocated for rapid detection andr esponse approaches, up
from less than 20% in 2015.
2016: Shift Cybersecurity Investment
Source: Gartner - Shift Cybersecurity Investment to Detection and Response, 7 January 2016
12
Security Outsourcing Fastest Growth
The information security market is estimated to have
grown 13.9% in revenue in 2015
with the IT security outsourcing segment
recording the fastest growth (25%).
Source: Gartner Forecast: Information Security, Worldwide, 2014-2020, 1Q16 Update
13
14
FS-ISAC Summit about “Know Your Data”
• Encryption at rest has become the new norm
• However, that’s not sufficient
• Visibility into how and where it flows during the
course of normal business is critical
Source: On May 18, 2016 Lawrence Chin reported from the FS-ISAC Summit
15
16
Keep cardholder data storage to a minimum by implementing data retention
and disposal policies, procedures and processes that include at least the
following for all cardholder data storage
Discovery Results Supporting Compliance
1. Limiting data storage amount and retention time to that which is required
for legal, regulatory, and/or business requirements
2. Specific retention requirements for cardholder data
3. Processes for secure deletion of data when no longer needed
4. A quarterly process for identifying and securely deleting stored
cardholder data that exceeds defined retention.
Old PCI DSS Requirement 3.1
17
• PCI DSS v2 did not have data flow in the 12
requirements, but mentioned it in “Scope of
Assessment for Compliance with PCI DSS
Requirements.”
• PCI DSS v3.1 added data flow into a requirement.
• PCI DSS v3.2 added data discovery into a requirement.
New PCI DSS 3.2 Standard – Data Discovery
Source: PCI DSS 3.2 Standard: data discovery (A3.2.5, A3.2.5.1, A3.2.6) for service providers
18
18
Example of
A Discovery
Process
Scoping
Asset Classification
Job Scan Definition
Scanning
Analysis
Reporting
Remediation
PCI DSS 3.2 Requirement - Discovery
19
Example - Discovery Scanning Job Status List
20
Discovery Deployment Example
Example of Customer Provisioning:
• Virtual host to load Software or Appliance
• User ID with “Read Only” Access
• Firewall Access
ApplianceDiscovery
Admin
Examples
21
STEP 4:
The scanning
execution can
be monitored
by Provider
and the
customer via a
Job Scheduler
interface
Discovery Process (Step 4) – Scanning Job Lists
22
I think it is Time to
Re-think our
Security Process
23
Are You Ready for
PCI DSS 3.2 Requirement –
Security Control Failures?
24
SOCTools
24/7 Eyes on
Glass (EoG)
monitoring,
Security
Operations
Center (SOC)
Managed
Tools Security
Service
Software as a Service (SaaS)
data discovery solution
Security Tools and Integrated Services
Discovery
Security Tools
and
Integrated
Services
25
Compliance
Assessments
• PCI DSS & PA Gap
• HIPAA (2013
HITECH)
• SSAE 16-SOC
2&3*
• GLBA, SOX
• FCRA, FISMA
• SB 1385, ISO
27XXX
• Security Posture
Assessments
(based on industry
best practices)
• BCP & DRP (SMB
market)
Professional
Security Services
• Security
Architecture
• Engineering/Operat
ions
• Staff Augmentation
• Penetration Testing
• Platform Baseline
Hardening (M/F,
Unix, Teradata, i-
Series, BYOD,
Windows)
• IDM/IAM/PAM
architecture
• SIEM design,
operation and
implementation
• eGRC Readiness &
Deployment
E Security &
Vendor
Products
• Data Discovery
• Managed Tools
Security Service
• Data Loss
Protection
• SIEM & Logging
• Identity and
Access
Management
• EndPoint
Protection
• Network Security
Devices
• Encryption
• Unified Threat
• Multi-factor
Authentication
Managed
Security
Services
• MSSP/SOC
• SIEM 365
• Data Center SOC
• IDM/IAM Security
Administration
• Healthcare
Infrastructure
Solutions (2013
3rd Qtr.
• Vulnerability
Scans
• Penetration
Testing
Samples of Our Services
26
26
Ulf Mattsson, Chief Technology Officer, Compliance Engineering
umattsson@complianceengineers.com
www.complianceengineers.com

More Related Content

PDF
How the latest trends in data security can help your data protection strategy...
PPTX
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
PDF
Isaca new delhi india privacy and big data
PDF
How can i find my security blind spots in Oracle - nyoug - sep 2016
PDF
How can i find my security blind spots ulf mattsson - aug 2016
PDF
LogSentinel Next-Gen SIEM
PDF
Network Security‬ and Big ‪‎Data Analytics‬
PPTX
GDPR Part 5: Better Together Quest & Cyberquest
How the latest trends in data security can help your data protection strategy...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Isaca new delhi india privacy and big data
How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots ulf mattsson - aug 2016
LogSentinel Next-Gen SIEM
Network Security‬ and Big ‪‎Data Analytics‬
GDPR Part 5: Better Together Quest & Cyberquest

What's hot (19)

PPTX
Webinar: Adaptive Security
PDF
Biznet GIO National Seminar on Digital Forensics
PDF
Enterprise policy-management
PPTX
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
PDF
Big Data Analytics to Enhance Security
PPTX
Security&Governance
PDF
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
PDF
Risk based it auditing for non it auditors (basics of it auditing) final 12
PDF
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
PPTX
User Behavior based Anomaly Detection for Cyber Network Security
PDF
Scalar_Managed_Security_Services_2016
PDF
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
PDF
AL_PCI-Cheatsheet_web
PPTX
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PDF
PTC Cloud Services Datasheet: Security Primer
 
PDF
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
PDF
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
PPTX
PCI DSS and PA DSS
PDF
Unlock the full potential of IoT
Webinar: Adaptive Security
Biznet GIO National Seminar on Digital Forensics
Enterprise policy-management
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Big Data Analytics to Enhance Security
Security&Governance
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
Risk based it auditing for non it auditors (basics of it auditing) final 12
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
User Behavior based Anomaly Detection for Cyber Network Security
Scalar_Managed_Security_Services_2016
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
AL_PCI-Cheatsheet_web
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PTC Cloud Services Datasheet: Security Primer
 
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
PCI DSS and PA DSS
Unlock the full potential of IoT
Ad

Similar to Time to re think our security process (20)

PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PDF
PCI Certification and remediation services
PPTX
Cyber Risk Management in 2017 - Challenges & Recommendations
PDF
Pci standards, from participation to implementation and review
PDF
PCI DSS Implementation: A Five Step Guide
PPTX
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
PPTX
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
PPTX
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
PPT
PCI DSS Compliance and Security: Harmony or Discord?
PPTX
PCI DSS Business as Usual (BAU)
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
PPTX
Security Analytics Beyond Cyber
PPTX
ISSA Atlanta - Emerging application and data protection for multi cloud
PDF
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
PDF
Big Data Security and Governance
PDF
Applying Auto-Data Classification Techniques for Large Data Sets
PPTX
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
PDF
Data Works Berlin 2018 - Worldpay - PCI Compliance
PPTX
Building Your Information Security Program: Frameworks & Metrics
PDF
AFAC session 2 - September 8, 2014
Cyber Risk Management in 2017: Challenges & Recommendations
PCI Certification and remediation services
Cyber Risk Management in 2017 - Challenges & Recommendations
Pci standards, from participation to implementation and review
PCI DSS Implementation: A Five Step Guide
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Business as Usual (BAU)
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
Security Analytics Beyond Cyber
ISSA Atlanta - Emerging application and data protection for multi cloud
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Big Data Security and Governance
Applying Auto-Data Classification Techniques for Large Data Sets
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Data Works Berlin 2018 - Worldpay - PCI Compliance
Building Your Information Security Program: Frameworks & Metrics
AFAC session 2 - September 8, 2014
Ad

More from Ulf Mattsson (20)

PPTX
Jun 29 new privacy technologies for unicode and international data standards ...
PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PPTX
PPTX
May 6 evolving international privacy regulations and cross border data tran...
PPTX
Qubit conference-new-york-2021
PDF
Secure analytics and machine learning in cloud use cases
PPTX
Evolving international privacy regulations and cross border data transfer - g...
PDF
Data encryption and tokenization for international unicode
PPTX
The future of data security and blockchain
PPTX
New technologies for data protection
PPTX
GDPR and evolving international privacy regulations
PPTX
Privacy preserving computing and secure multi-party computation ISACA Atlanta
PPTX
Safeguarding customer and financial data in analytics and machine learning
PPTX
Protecting data privacy in analytics and machine learning ISACA London UK
PPTX
New opportunities and business risks with evolving privacy regulations
PPTX
What is tokenization in blockchain - BCS London
PPTX
Protecting data privacy in analytics and machine learning - ISACA
PPTX
What is tokenization in blockchain?
PPTX
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
PPTX
Unlock the potential of data security 2020
Jun 29 new privacy technologies for unicode and international data standards ...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
May 6 evolving international privacy regulations and cross border data tran...
Qubit conference-new-york-2021
Secure analytics and machine learning in cloud use cases
Evolving international privacy regulations and cross border data transfer - g...
Data encryption and tokenization for international unicode
The future of data security and blockchain
New technologies for data protection
GDPR and evolving international privacy regulations
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Safeguarding customer and financial data in analytics and machine learning
Protecting data privacy in analytics and machine learning ISACA London UK
New opportunities and business risks with evolving privacy regulations
What is tokenization in blockchain - BCS London
Protecting data privacy in analytics and machine learning - ISACA
What is tokenization in blockchain?
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Unlock the potential of data security 2020

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation theory and applications.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Monthly Chronicles - July 2025
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation theory and applications.pdf
Review of recent advances in non-invasive hemoglobin estimation
Digital-Transformation-Roadmap-for-Companies.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Time to re think our security process

  • 1. 1 1 Time to Re-think our Security Process Ulf Mattsson, Chief Technology Officer, Compliance Engineering umattsson@complianceengineers.com www.complianceengineers.com
  • 2. 2 Ulf Mattsson Inventor of more than 25 US Patents Industry Involvement PCI DSS - PCI Security Standards Council • Encryption & Tokenization Task Forces, Cloud & Virtualization SIGs IFIP - International Federation for Information Processing • WG 11.3 Data and Application Security CSA - Cloud Security Alliance ANSI - American National Standards Institute • ANSI X9 Tokenization Work Group NIST - National Institute of Standards and Technology • NIST Big Data Working Group User Groups • Security: ISSA & ISACA • Databases: IBM & Oracle
  • 3. 3 My work with PCI DSS Standards Payment Card Industry Security Standards Council (PCI SSC) 1. PCI SSC Tokenization Task Force 2. PCI SSC Encryption Task Force 3. PCI SSC Point to Point Encryption Task Force 4. PCI SSC Risk Assessment SIG 5. PCI SSC eCommerce SIG 6. PCI SSC Cloud SIG 7. PCI SSC Virtualization SIG 8. PCI SSC Pre-Authorization SIG 9. PCI SSC Scoping SIG Working Group 10. PCI SSC 2013 – 2014 Tokenization Task Force
  • 4. 4
  • 5. 5 Encryption Usage - Mature vs. Immature Companies Source: Ponemon - Encryption Application Trends Study • June 2016 Lessuseofencryption Do we know our sensitive data? Big Data Public Cloud
  • 6. 6 Not Knowing Where Sensitive Data Is Source: The State of Data Security Intelligence, Ponemon Institute, 2015
  • 7. 7 Not Managing Risks to Sensitive Data Source: The State of Data Security Intelligence, Ponemon Institute, 2015 Access Patterns Data Discovery Data Access
  • 8. 8
  • 9. 9 Cloud Providers Not Becoming Security Vendors • There is great demand for security providers that can offer orchestration of security policy and controls that span not just multicloud environments but also extend to on-premises infrastructure • Customers are starting to realize that the responsibility for mitigating risks associated with user behavior lies with them and not the CSP — driving them to evaluate a strategy that allows for incident detection, response and remediation capabilities in cloud environments Source: Gartner: Market Trends: Are Cloud Providers Becoming Security Vendors? , May 2016
  • 10. 10 • Centrally managed security policy • Across unstructured and structured silos • Classify data, control access and monitoring • Protection – encryption, tokenization and masking • Segregation of duties – application users and privileged users • Auditing and reporting 2014: Data–Centric Audit and Protection (DCAP) Source: Gartner – Market Guide for Data – Centric Audit and Protection (DCAP), Nov 21 2014
  • 11. 11 • IT risk and security leaders must move from trying to prevent every threat and acknowledge that perfect protection is not achievable. • Organizations need to detect and respond to malicious behaviors and incidents, because even the best preventative controls will not prevent all incidents. • By 2020, 60% of enterprise information security budgets will be allocated for rapid detection andr esponse approaches, up from less than 20% in 2015. 2016: Shift Cybersecurity Investment Source: Gartner - Shift Cybersecurity Investment to Detection and Response, 7 January 2016
  • 12. 12 Security Outsourcing Fastest Growth The information security market is estimated to have grown 13.9% in revenue in 2015 with the IT security outsourcing segment recording the fastest growth (25%). Source: Gartner Forecast: Information Security, Worldwide, 2014-2020, 1Q16 Update
  • 13. 13
  • 14. 14 FS-ISAC Summit about “Know Your Data” • Encryption at rest has become the new norm • However, that’s not sufficient • Visibility into how and where it flows during the course of normal business is critical Source: On May 18, 2016 Lawrence Chin reported from the FS-ISAC Summit
  • 15. 15
  • 16. 16 Keep cardholder data storage to a minimum by implementing data retention and disposal policies, procedures and processes that include at least the following for all cardholder data storage Discovery Results Supporting Compliance 1. Limiting data storage amount and retention time to that which is required for legal, regulatory, and/or business requirements 2. Specific retention requirements for cardholder data 3. Processes for secure deletion of data when no longer needed 4. A quarterly process for identifying and securely deleting stored cardholder data that exceeds defined retention. Old PCI DSS Requirement 3.1
  • 17. 17 • PCI DSS v2 did not have data flow in the 12 requirements, but mentioned it in “Scope of Assessment for Compliance with PCI DSS Requirements.” • PCI DSS v3.1 added data flow into a requirement. • PCI DSS v3.2 added data discovery into a requirement. New PCI DSS 3.2 Standard – Data Discovery Source: PCI DSS 3.2 Standard: data discovery (A3.2.5, A3.2.5.1, A3.2.6) for service providers
  • 18. 18 18 Example of A Discovery Process Scoping Asset Classification Job Scan Definition Scanning Analysis Reporting Remediation PCI DSS 3.2 Requirement - Discovery
  • 19. 19 Example - Discovery Scanning Job Status List
  • 20. 20 Discovery Deployment Example Example of Customer Provisioning: • Virtual host to load Software or Appliance • User ID with “Read Only” Access • Firewall Access ApplianceDiscovery Admin Examples
  • 21. 21 STEP 4: The scanning execution can be monitored by Provider and the customer via a Job Scheduler interface Discovery Process (Step 4) – Scanning Job Lists
  • 22. 22 I think it is Time to Re-think our Security Process
  • 23. 23 Are You Ready for PCI DSS 3.2 Requirement – Security Control Failures?
  • 24. 24 SOCTools 24/7 Eyes on Glass (EoG) monitoring, Security Operations Center (SOC) Managed Tools Security Service Software as a Service (SaaS) data discovery solution Security Tools and Integrated Services Discovery Security Tools and Integrated Services
  • 25. 25 Compliance Assessments • PCI DSS & PA Gap • HIPAA (2013 HITECH) • SSAE 16-SOC 2&3* • GLBA, SOX • FCRA, FISMA • SB 1385, ISO 27XXX • Security Posture Assessments (based on industry best practices) • BCP & DRP (SMB market) Professional Security Services • Security Architecture • Engineering/Operat ions • Staff Augmentation • Penetration Testing • Platform Baseline Hardening (M/F, Unix, Teradata, i- Series, BYOD, Windows) • IDM/IAM/PAM architecture • SIEM design, operation and implementation • eGRC Readiness & Deployment E Security & Vendor Products • Data Discovery • Managed Tools Security Service • Data Loss Protection • SIEM & Logging • Identity and Access Management • EndPoint Protection • Network Security Devices • Encryption • Unified Threat • Multi-factor Authentication Managed Security Services • MSSP/SOC • SIEM 365 • Data Center SOC • IDM/IAM Security Administration • Healthcare Infrastructure Solutions (2013 3rd Qtr. • Vulnerability Scans • Penetration Testing Samples of Our Services
  • 26. 26 26 Ulf Mattsson, Chief Technology Officer, Compliance Engineering umattsson@complianceengineers.com www.complianceengineers.com