Get the reportMore
February 10, 2016
February 10, 2016
Payment card fraud is big business for organized groups of hackers around the world, and the costs of data breaches continue to rise for consumers, banks, and businesses. That's why organizations of any size that process, store, or transmit payment card data are required to comply with the Payment Card Industry Data Security Standard (PCI DSS), which aim to prevent such sensitive information from falling into the wrong hands. Failing to achieve PCI Compliance is not only damaging from a compliance perspective, but can also be damning from a brand and customer base perspective.
For organizations striving to achieve or maintain PCI compliance, meeting each of the individual requirements can be difficult and overwhelming. Among the more challenging PCI requirements for many organizations is Requirement 10. This requirement mandates that organizations centralize, review and retain their network and application log files and then protect those logs so they cannot be deleted or modified.
Complying with Requirement 10 can be quite a burden for many IT organizations because of the volume, variety and velocity of data that are part of the modern IT infrastructure that powers many digital initiatives. Organizations looking to meet PCI compliance requirements must find a solution that can easily aggregate their data in a secure manner and provide the ability for users to easily pull insights and metrics from this body of data.
View this webcast for more information on PCI compliance, Requirement 10, and solutions to help your organization safeguard payment card data and maintain compliance.
Sean Michael Kerner, Senior Editor at QuinStreet Enterprise
Mark Bloom, Director Product Marketing, Compliance and Security at Sumo Logic
Build, run, and secure modern applications and cloud infrastructures.Start free trial
It's no secret that continuous innovation and speed to market are mandating dynamic paradigm shifts in how companies conceive, develop and implement IT operations and security strategies. While this is all fine and well for the DevOps teams, for the folks managing security, these innovations bring up new challenges. Modern applications must be architected and managed with security in mind from the get-go, and building a SaaS offering that has security baked in is a whole new game. DevSecOps is the name of the game, but there isn't always a clear path to implementation and adoption. Between protecting against major attacks that arrive on a daily basis to maintaining compliance with strict regulations, leaving the boundaries of traditional IT can leave some security professionals quaking in their boots. Fear not, friends! There is a way to be secure and compliant in the cloud with the right approach. In this webinar, George Gerchow, VP of Security and Compliance at Sumo Logic, will do a deep dive into the steps it takes to successfully implement and maintain DevSecOps in your organization at scale. He will be discussing: What it took to build a world-class data analytics service on AWS from the ground up Technologies used to gain necessary operational and security visibility Tips and tricks to maintain optimal levels of performance, integrity and availability of the data How to best approach regulatory compliance in the cloud in pursuing certifications like PCI DSS, ISO 27001, CSA STAR, TRUSTe, SOC 2, Type 2, etc. Challenges encountered in the journey and how they were addressed