SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
1/29/2014

Walking the tightrope: The compliance and security balancing act

SearchCompliance.com
Walking the tightrope: The compliance and security balancing act
Nothing illustrates the difference between compliance and security better than the recent holiday retail fiascos,
when millions of credit card numbers were stolen from large retailers, including Target, that were assumed to be
compliant with industry standards and regulations.
The things [regulators] are requiring organizations to do are things they should be doing as good
security practice anyway.
Mike Chapple, senior director for IT service delivery, University of Notre Dame
After the stories broke regarding the breached retailers, it became clear that compliance gaps are almost
guaranteed to lead to security problems. According to experts, compliance and security aren't mutually exclusive,
and both need to be attended to regularly.
One of the mistakes that organizations tend to make is applying a set of compliance standards and assuming that
will be enough to also remain secure, said Hans Guilbeaux, director of information security and compliance at
Farmington Hills, Mich.-based consultancy Assure360.
"Unfortunately, a lot of companies think compliance is one-size-fits-all or that, conversely, they can go to a thirdparty vendor and buy compliance in a box," Guilbeaux said. "What I frequently hear … is that compliance is one
checkmark away from being hacked."
It's important to remember that malfeasants know what they're doing and where the vulnerabilities are.
Regulators aren't necessarily security experts, either -- even those examiners who visit organizations to ensure
compliance, according to Matt Wilhelm, CEO of Cleveland, Ohio-based IT consultancy EnCompass Group
LLC.
"Oftentimes, they're not IT folks at all," he said, and these examiners are often just looking at the checklist: patch
management, regular firewall logs and other items on the compliance list that don't necessarily equal security.
"They themselves can't keep the hackers out," Wilhelm added.
But compliance -- full compliance -- remains critical, and not just to protect customer information. "In our
business, we're constantly saying, 'How do you put a dollar value on that?' … One data breach could destroy
brand value and brand equity," he said.
For example, even though Target offered a 10%across-the-board discount after its recent data breach, it still had
a less-lucrative holiday season because people stayed away, Wilhelm added.

Embrace common security, compliance goals
When you boil it down, security and compliance end up being two sides of the same coin, according to Mike
Chapple, senior director for IT service delivery at the University of Notre Dame in Indiana. "Compliance is going
to be what you need to satisfy obligations to external parties [like] regulators," he said. Security, on the other
http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print

1/3
1/29/2014

Walking the tightrope: The compliance and security balancing act

hand, is making sure that the application controls are in place and that the organization is taking sufficient steps to
protect information, he added.
Using compliance as a starting point isn't a bad thing, according to Chapple. "When you're looking at the
different regulations out there, for the most part, the things [regulators] are requiring organizations to do are things
they should be doing as good security practice anyway," he said.
The first step for organizations that want to strike a balance between compliance and security is to conduct a risk
assessment, Chapple said. While these are typically required on an annual basis for compliance purposes, it's
important for organizations to approach risk assessments as more than an exercise and as an essential, thorough
piece of security to determine vulnerabilities, he said.
"It's important to have compliance plans, and that goes back to not creating a program that just studies for the
test every year … but instead having a documented plan that looks at what are each of the requirements facing
the organization and what is our response? How are we implementing those?" Chapple said.
More on security and compliance
Tips to align company-wide compliance and security processes
The compliance benefits of continuous data monitoring
For example, compliance with Payment Card Industry standards requires submission of quarterly vulnerability
scans to the organization's bank. Those scans would go into the compliance plan and be assigned to a team
member, who would then submit the results and save the records of the scans in a designated place.
"Then, whenever you want to review your compliance status, you should be able to look at those plans and see
that there is a control in place to meet each one of the requirements of a particular regulation and that somebody
has validated compliance with it recently," Chapple said.
Finally, communication between IT and legal is critical to making security and compliance work, according to
Chapple. Many organizations do this by forming compliance bodies within the organization, such as committees
made up of representatives from different departments. These committees may either cover just IT or all of the
organization's compliance obligations. Often, those committees consider broader risk categories for the
organization as well, he said.
Ultimately, organizations should choose to use compliance guidelines as the foundation for a security program.
The business can then communicate these guidelines across the organization to ensure all departments have the
opportunity to raise concerns. The organizations that take this approach to balancing compliance and security are
better poised to stay on the right side of regulators and avoid breaches.
About the author:
Christine Parizo is a freelance writer specializing in business and technology. She focuses on feature
articles for a variety of technology- and business-focused publications, as well as case studies and white
papers for business-to-business technology companies. Prior to launching her freelance career, Parizo
was an assistant news editor for SearchCRM.
http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print

2/3
1/29/2014

Walking the tightrope: The compliance and security balancing act

Let us know what you think about the story; email Ben Cole, site editor. For more regulatory compliance
news and updates throughout the week, follow us on Twitter @ITCompliance.
28 Jan 2014
All Rights Reserved, Copyright 2009 - 2014 , TechTarget | Read our Privacy Statement

http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print

3/3

Más contenido relacionado

Más de assure360

NDeX Data Centers: A Vault in the Cloud
NDeX Data Centers: A Vault in the CloudNDeX Data Centers: A Vault in the Cloud
NDeX Data Centers: A Vault in the Cloudassure360
 
Legal League 100 Servicer Summit, Dallas TX on April 18th: Agenda
Legal League 100 Servicer Summit, Dallas TX on April 18th: AgendaLegal League 100 Servicer Summit, Dallas TX on April 18th: Agenda
Legal League 100 Servicer Summit, Dallas TX on April 18th: Agendaassure360
 
By Scott Goldstein: The AG Settlement Settles In
By Scott Goldstein: The AG Settlement Settles InBy Scott Goldstein: The AG Settlement Settles In
By Scott Goldstein: The AG Settlement Settles Inassure360
 
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New RegulationsBy Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulationsassure360
 
In the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOIn the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOassure360
 
In the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOIn the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOassure360
 
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New TerritoryBy Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territoryassure360
 

Más de assure360 (7)

NDeX Data Centers: A Vault in the Cloud
NDeX Data Centers: A Vault in the CloudNDeX Data Centers: A Vault in the Cloud
NDeX Data Centers: A Vault in the Cloud
 
Legal League 100 Servicer Summit, Dallas TX on April 18th: Agenda
Legal League 100 Servicer Summit, Dallas TX on April 18th: AgendaLegal League 100 Servicer Summit, Dallas TX on April 18th: Agenda
Legal League 100 Servicer Summit, Dallas TX on April 18th: Agenda
 
By Scott Goldstein: The AG Settlement Settles In
By Scott Goldstein: The AG Settlement Settles InBy Scott Goldstein: The AG Settlement Settles In
By Scott Goldstein: The AG Settlement Settles In
 
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New RegulationsBy Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
 
In the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOIn the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIO
 
In the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOIn the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIO
 
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New TerritoryBy Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Quotes & Commentary from Hans Guilbeaux, Director of InfoSec & Compliance | Walking the tightrope: The compliance and security balancing act

  • 1. 1/29/2014 Walking the tightrope: The compliance and security balancing act SearchCompliance.com Walking the tightrope: The compliance and security balancing act Nothing illustrates the difference between compliance and security better than the recent holiday retail fiascos, when millions of credit card numbers were stolen from large retailers, including Target, that were assumed to be compliant with industry standards and regulations. The things [regulators] are requiring organizations to do are things they should be doing as good security practice anyway. Mike Chapple, senior director for IT service delivery, University of Notre Dame After the stories broke regarding the breached retailers, it became clear that compliance gaps are almost guaranteed to lead to security problems. According to experts, compliance and security aren't mutually exclusive, and both need to be attended to regularly. One of the mistakes that organizations tend to make is applying a set of compliance standards and assuming that will be enough to also remain secure, said Hans Guilbeaux, director of information security and compliance at Farmington Hills, Mich.-based consultancy Assure360. "Unfortunately, a lot of companies think compliance is one-size-fits-all or that, conversely, they can go to a thirdparty vendor and buy compliance in a box," Guilbeaux said. "What I frequently hear … is that compliance is one checkmark away from being hacked." It's important to remember that malfeasants know what they're doing and where the vulnerabilities are. Regulators aren't necessarily security experts, either -- even those examiners who visit organizations to ensure compliance, according to Matt Wilhelm, CEO of Cleveland, Ohio-based IT consultancy EnCompass Group LLC. "Oftentimes, they're not IT folks at all," he said, and these examiners are often just looking at the checklist: patch management, regular firewall logs and other items on the compliance list that don't necessarily equal security. "They themselves can't keep the hackers out," Wilhelm added. But compliance -- full compliance -- remains critical, and not just to protect customer information. "In our business, we're constantly saying, 'How do you put a dollar value on that?' … One data breach could destroy brand value and brand equity," he said. For example, even though Target offered a 10%across-the-board discount after its recent data breach, it still had a less-lucrative holiday season because people stayed away, Wilhelm added. Embrace common security, compliance goals When you boil it down, security and compliance end up being two sides of the same coin, according to Mike Chapple, senior director for IT service delivery at the University of Notre Dame in Indiana. "Compliance is going to be what you need to satisfy obligations to external parties [like] regulators," he said. Security, on the other http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print 1/3
  • 2. 1/29/2014 Walking the tightrope: The compliance and security balancing act hand, is making sure that the application controls are in place and that the organization is taking sufficient steps to protect information, he added. Using compliance as a starting point isn't a bad thing, according to Chapple. "When you're looking at the different regulations out there, for the most part, the things [regulators] are requiring organizations to do are things they should be doing as good security practice anyway," he said. The first step for organizations that want to strike a balance between compliance and security is to conduct a risk assessment, Chapple said. While these are typically required on an annual basis for compliance purposes, it's important for organizations to approach risk assessments as more than an exercise and as an essential, thorough piece of security to determine vulnerabilities, he said. "It's important to have compliance plans, and that goes back to not creating a program that just studies for the test every year … but instead having a documented plan that looks at what are each of the requirements facing the organization and what is our response? How are we implementing those?" Chapple said. More on security and compliance Tips to align company-wide compliance and security processes The compliance benefits of continuous data monitoring For example, compliance with Payment Card Industry standards requires submission of quarterly vulnerability scans to the organization's bank. Those scans would go into the compliance plan and be assigned to a team member, who would then submit the results and save the records of the scans in a designated place. "Then, whenever you want to review your compliance status, you should be able to look at those plans and see that there is a control in place to meet each one of the requirements of a particular regulation and that somebody has validated compliance with it recently," Chapple said. Finally, communication between IT and legal is critical to making security and compliance work, according to Chapple. Many organizations do this by forming compliance bodies within the organization, such as committees made up of representatives from different departments. These committees may either cover just IT or all of the organization's compliance obligations. Often, those committees consider broader risk categories for the organization as well, he said. Ultimately, organizations should choose to use compliance guidelines as the foundation for a security program. The business can then communicate these guidelines across the organization to ensure all departments have the opportunity to raise concerns. The organizations that take this approach to balancing compliance and security are better poised to stay on the right side of regulators and avoid breaches. About the author: Christine Parizo is a freelance writer specializing in business and technology. She focuses on feature articles for a variety of technology- and business-focused publications, as well as case studies and white papers for business-to-business technology companies. Prior to launching her freelance career, Parizo was an assistant news editor for SearchCRM. http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print 2/3
  • 3. 1/29/2014 Walking the tightrope: The compliance and security balancing act Let us know what you think about the story; email Ben Cole, site editor. For more regulatory compliance news and updates throughout the week, follow us on Twitter @ITCompliance. 28 Jan 2014 All Rights Reserved, Copyright 2009 - 2014 , TechTarget | Read our Privacy Statement http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print 3/3