SlideShare uma empresa Scribd logo
1 de 23
How We  Did The Investigations “ The Case of the    Credit Card Breach” Brought to you by and
We’re Getting A Lot of Questions …  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],BSI  Level  3 LOLA  DOUGLAS
We’ve Got a Problem! ,[object Object],[object Object],Bob Shield, CSO Leslie Oakwood Taylor & Swift CEO John Howard CEO, Grassroots Bank
Chief Security Officer Bob Shield Hires  2 BSI Investigators to Help ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],BSI  Level  3 LOLA  DOUGLAS BSI Teradata Level 3 FRAZIER McDONALD
Taylor & Swift PCI DSS Security Audit Taylor & Swift passed an external PCI DSS audit that showed their systems to be compliant with the PCI DSS industry standard for protecting credit cards. Bob Shields gave a copy of the report to both Frazier and Lola to study
Taylor & Swift System Architecture  (From PCI Audit) Lola notes that this is a common retail system architecture where credit card transactions collected at stores or the web flow through data centers to an EDW and ultimately to Back Up.
T&S’s Front-End (Store and Web, Data Center) Data Flow Processes and System Architecture T&S mini-batch loads POS data every hour to the data centers. Web transactions drop immediately into the data centers.  The multiple data centers offer high availability as well as disaster recovery, in addition to workload balancing.
Taylor and Swift Back-Office Data Flows Data centers are used for inventory and ERP financial applications. Data flows at  1 hour intervals into Teradata for marketing and merchandising purposes.
Taylor & Swift  Teradata Active Data Warehouse ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Policy Foundational Questions/Answers: Protecting Sensitive Data
Protecting the Enterprise Data Flow The typical retail merchant data flow is depicted in this diagram.  Protegrity protects the sensitive data – credit cards in this case – from creation to archive. POS e-Commerce Branch ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ESA Key Management
Lola Investigated the Front-End Systems Lola worked with the Store and Web IT Groups. The system had a full PCI audit review and approval.  This led the team to investigate the Front-End Systems.  All systems came out clean with no intrusions and the data is protected from the swipe through the point where the transaction data moves to the data centers.
Frazier Investigated the Back-End Systems Frazier  worked with the back-end team to investigate how credit cards are handled in the back-end processing at the data centers. The back-end system also had a full PCI audit review and approval.  The back-end systems came out clean with no intrusions and the data is protected inside the back-end systems.
Frazier Checked the Role - and Time-Based Security Access Controls That Were Set Up In the case of the Credit Card Field, Protegrity’s tool defined 2 roles – one with High clearance, and one with Low, with access permission to the data only  for High clearance only during  daytime working hours.  Frazier found that the Protegrity policy controls that were initially set up were not changed – no security hole there.
Frazier Ran A Protegrity Detailed Report on the   Card Number Column – Decrease was the Clue! Frazier dug into the Protegrity  reports on key  data elements.  In this case, the  Production Credit Card Number – and found a suspicious  dip in the number of daily touches.
Frazier Inspected Credit Card Column Access  Frazier drilled down on each of the repositories and found that the touches of the Credit Card data in the SQL Servers dropped to 0
Core Problem: IT Swapped Out Protected Operational Data Stores at the Data Center, Forgot to Protect Lola and Frazier had a call with the Data Center IT Manager and found out that the staging databases had been changed -  from SQL Server databases to another 3 rd  party database.  No PCI audit was done after the switch and  the new databases had not been protected.
Audit Logs in SQL Servers in the Data Centers Show Suspicious Activity by a DBA  Lola went back to the Log activity on the unprotected system and found some unusual  SELECT *  activities on Orders and Customers.  The queries  were executed by a DBA at the Las Vegas Data Center by the name of Joe Nagle.
Records from DBA Query Matched the List Pull Against the Complaining Customers  Frazier ran a query to JOIN the 500 records with the complaints with the credit card transactions.  All customers who were breached had shown the fraudulent activity in the unprotected database. They all matched!
The Culprit: Joe Nagel, DBA Lola worked with the data center IT people to pull the security tapes to make sure Joe was working that day … here he is exiting the facility in the early morning hours. Bob then confiscated his PC and found customer credit card information on his laptop.   NABBED!
Resolution: Customer and Technical ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Taylor &  Swift Gold Leslie worked with the head of Marketing  Communications to get an alert out Bob worked to fix the technical holes
Summary The Case of the Credit Card Breach Taylor & Swift experienced a major credit card  breach, detected only when customers began complaining ,[object Object],[object Object],[object Object],Drilling into the details exposed the real problem:  Disgruntled employee Joe Nagel exploited the lack of protection on  the Operational Data Stores at  the Data Center to gain unauthorized  access and sell data on the black market. CASE CLOSED
Learn More   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

DAS Slides: Data Governance - Combining Data Management with Organizational ...
DAS Slides: Data Governance -  Combining Data Management with Organizational ...DAS Slides: Data Governance -  Combining Data Management with Organizational ...
DAS Slides: Data Governance - Combining Data Management with Organizational ...DATAVERSITY
 
Get started with data migration
Get started with data migrationGet started with data migration
Get started with data migrationThinqloud
 
Data Catalog as the Platform for Data Intelligence
Data Catalog as the Platform for Data IntelligenceData Catalog as the Platform for Data Intelligence
Data Catalog as the Platform for Data IntelligenceAlation
 
Data Maturity - A Balanced Approach
Data Maturity - A Balanced ApproachData Maturity - A Balanced Approach
Data Maturity - A Balanced ApproachDATAVERSITY
 
UNIT 1- Data Warehouse.pdf
UNIT 1- Data Warehouse.pdfUNIT 1- Data Warehouse.pdf
UNIT 1- Data Warehouse.pdfNancykumari47
 
The what, why, and how of master data management
The what, why, and how of master data managementThe what, why, and how of master data management
The what, why, and how of master data managementMohammad Yousri
 
Data Vault Vs Data Lake
Data Vault Vs Data LakeData Vault Vs Data Lake
Data Vault Vs Data LakeCalum Miller
 
Ibm informatica interview question answers
Ibm informatica interview question answersIbm informatica interview question answers
Ibm informatica interview question answersSweta Singh
 
(Lecture 4)Slowly Changing Dimensions.pdf
(Lecture 4)Slowly Changing Dimensions.pdf(Lecture 4)Slowly Changing Dimensions.pdf
(Lecture 4)Slowly Changing Dimensions.pdfMobeenMasoudi
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityDATAVERSITY
 
Real-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework ComponentsReal-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework ComponentsDATAVERSITY
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trustOptimediaSpain
 
Big data lecture notes
Big data lecture notesBig data lecture notes
Big data lecture notesMohit Saini
 
Datawarehousing and Business Intelligence
Datawarehousing and Business IntelligenceDatawarehousing and Business Intelligence
Datawarehousing and Business IntelligencePrithwis Mukerjee
 
Data Architecture for Data Governance
Data Architecture for Data GovernanceData Architecture for Data Governance
Data Architecture for Data GovernanceDATAVERSITY
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best PracticesBoris Otto
 
Preparing For a Master Data Management Implemenation
Preparing For a Master Data Management ImplemenationPreparing For a Master Data Management Implemenation
Preparing For a Master Data Management ImplemenationInnovative_Systems
 
LDM Slides: How Data Modeling Fits into an Overall Enterprise Architecture
LDM Slides: How Data Modeling Fits into an Overall Enterprise ArchitectureLDM Slides: How Data Modeling Fits into an Overall Enterprise Architecture
LDM Slides: How Data Modeling Fits into an Overall Enterprise ArchitectureDATAVERSITY
 

Mais procurados (20)

DAS Slides: Data Governance - Combining Data Management with Organizational ...
DAS Slides: Data Governance -  Combining Data Management with Organizational ...DAS Slides: Data Governance -  Combining Data Management with Organizational ...
DAS Slides: Data Governance - Combining Data Management with Organizational ...
 
Get started with data migration
Get started with data migrationGet started with data migration
Get started with data migration
 
Data Catalog as the Platform for Data Intelligence
Data Catalog as the Platform for Data IntelligenceData Catalog as the Platform for Data Intelligence
Data Catalog as the Platform for Data Intelligence
 
DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
 
Data Maturity - A Balanced Approach
Data Maturity - A Balanced ApproachData Maturity - A Balanced Approach
Data Maturity - A Balanced Approach
 
UNIT 1- Data Warehouse.pdf
UNIT 1- Data Warehouse.pdfUNIT 1- Data Warehouse.pdf
UNIT 1- Data Warehouse.pdf
 
The what, why, and how of master data management
The what, why, and how of master data managementThe what, why, and how of master data management
The what, why, and how of master data management
 
Data Vault Vs Data Lake
Data Vault Vs Data LakeData Vault Vs Data Lake
Data Vault Vs Data Lake
 
Ibm informatica interview question answers
Ibm informatica interview question answersIbm informatica interview question answers
Ibm informatica interview question answers
 
(Lecture 4)Slowly Changing Dimensions.pdf
(Lecture 4)Slowly Changing Dimensions.pdf(Lecture 4)Slowly Changing Dimensions.pdf
(Lecture 4)Slowly Changing Dimensions.pdf
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Real-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework ComponentsReal-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework Components
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
 
Big data lecture notes
Big data lecture notesBig data lecture notes
Big data lecture notes
 
Datawarehousing and Business Intelligence
Datawarehousing and Business IntelligenceDatawarehousing and Business Intelligence
Datawarehousing and Business Intelligence
 
Data Architecture for Data Governance
Data Architecture for Data GovernanceData Architecture for Data Governance
Data Architecture for Data Governance
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
 
Preparing For a Master Data Management Implemenation
Preparing For a Master Data Management ImplemenationPreparing For a Master Data Management Implemenation
Preparing For a Master Data Management Implemenation
 
ETL Process
ETL ProcessETL Process
ETL Process
 
LDM Slides: How Data Modeling Fits into an Overall Enterprise Architecture
LDM Slides: How Data Modeling Fits into an Overall Enterprise ArchitectureLDM Slides: How Data Modeling Fits into an Overall Enterprise Architecture
LDM Slides: How Data Modeling Fits into an Overall Enterprise Architecture
 

Destaque

BSI Teradata: The Case of the Dropped Mobile Calls
BSI Teradata: The Case of the Dropped Mobile CallsBSI Teradata: The Case of the Dropped Mobile Calls
BSI Teradata: The Case of the Dropped Mobile CallsTeradata
 
How we did it: BSI: Teradata Case of the Tainted Lasagna
How we did it: BSI: Teradata Case of the Tainted LasagnaHow we did it: BSI: Teradata Case of the Tainted Lasagna
How we did it: BSI: Teradata Case of the Tainted LasagnaTeradata
 
Sad Case of Stagno Bank - how we did it
Sad Case of Stagno Bank - how we did itSad Case of Stagno Bank - how we did it
Sad Case of Stagno Bank - how we did itTeradata
 
How We Did It: The Case of the Retail Tweeters
How We Did It: The Case of the Retail TweetersHow We Did It: The Case of the Retail Tweeters
How We Did It: The Case of the Retail TweetersTeradata
 
Swift: Immutability and You
Swift: Immutability and YouSwift: Immutability and You
Swift: Immutability and YouJens Ravens
 
BSI Teradata: The Shocking Case of Home Electronics Planet
BSI Teradata: The Shocking Case of Home Electronics PlanetBSI Teradata: The Shocking Case of Home Electronics Planet
BSI Teradata: The Shocking Case of Home Electronics PlanetTeradata
 
Swift Architecture and Practice, by Alex Yang
Swift Architecture and Practice, by Alex YangSwift Architecture and Practice, by Alex Yang
Swift Architecture and Practice, by Alex YangHui Cheng
 

Destaque (7)

BSI Teradata: The Case of the Dropped Mobile Calls
BSI Teradata: The Case of the Dropped Mobile CallsBSI Teradata: The Case of the Dropped Mobile Calls
BSI Teradata: The Case of the Dropped Mobile Calls
 
How we did it: BSI: Teradata Case of the Tainted Lasagna
How we did it: BSI: Teradata Case of the Tainted LasagnaHow we did it: BSI: Teradata Case of the Tainted Lasagna
How we did it: BSI: Teradata Case of the Tainted Lasagna
 
Sad Case of Stagno Bank - how we did it
Sad Case of Stagno Bank - how we did itSad Case of Stagno Bank - how we did it
Sad Case of Stagno Bank - how we did it
 
How We Did It: The Case of the Retail Tweeters
How We Did It: The Case of the Retail TweetersHow We Did It: The Case of the Retail Tweeters
How We Did It: The Case of the Retail Tweeters
 
Swift: Immutability and You
Swift: Immutability and YouSwift: Immutability and You
Swift: Immutability and You
 
BSI Teradata: The Shocking Case of Home Electronics Planet
BSI Teradata: The Shocking Case of Home Electronics PlanetBSI Teradata: The Shocking Case of Home Electronics Planet
BSI Teradata: The Shocking Case of Home Electronics Planet
 
Swift Architecture and Practice, by Alex Yang
Swift Architecture and Practice, by Alex YangSwift Architecture and Practice, by Alex Yang
Swift Architecture and Practice, by Alex Yang
 

Semelhante a How We Did It: The Case of the Credit Card Breach

Time Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today'sTime Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today'sInside Analysis
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance ReportHolly Vega
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Steven Meister
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentialsCraig Mullins
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordCor Ranzijn
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfHajeJanKamps
 
FDSeminar Reporting & controlling
FDSeminar Reporting & controllingFDSeminar Reporting & controlling
FDSeminar Reporting & controllingFDMagazine
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityJoel Cardella
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
New york oracle users group 2013 spring general meeting ulf mattsson
New york oracle users group 2013 spring general meeting   ulf mattssonNew york oracle users group 2013 spring general meeting   ulf mattsson
New york oracle users group 2013 spring general meeting ulf mattssonUlf Mattsson
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 

Semelhante a How We Did It: The Case of the Credit Card Breach (20)

Time Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today'sTime Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today's
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
 
FDSeminar Reporting & controlling
FDSeminar Reporting & controllingFDSeminar Reporting & controlling
FDSeminar Reporting & controlling
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
New york oracle users group 2013 spring general meeting ulf mattsson
New york oracle users group 2013 spring general meeting   ulf mattssonNew york oracle users group 2013 spring general meeting   ulf mattsson
New york oracle users group 2013 spring general meeting ulf mattsson
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 

Mais de Teradata

How to Use Algorithms to Scale Digital Business
How to Use Algorithms to Scale Digital BusinessHow to Use Algorithms to Scale Digital Business
How to Use Algorithms to Scale Digital BusinessTeradata
 
SENTIENT ENTERPRISE
SENTIENT ENTERPRISESENTIENT ENTERPRISE
SENTIENT ENTERPRISETeradata
 
What Does It Mean to Digitize a Company?
What Does It Mean to Digitize a Company?What Does It Mean to Digitize a Company?
What Does It Mean to Digitize a Company?Teradata
 
Teradata Listener™: Radically Simplify Big Data Streaming
Teradata Listener™: Radically Simplify Big Data StreamingTeradata Listener™: Radically Simplify Big Data Streaming
Teradata Listener™: Radically Simplify Big Data StreamingTeradata
 
It’s Not Enough to Just Collect Data
It’s Not Enough to Just Collect DataIt’s Not Enough to Just Collect Data
It’s Not Enough to Just Collect DataTeradata
 
Who’s Driving Your Brand: Navigating Today’s Confusing Customer Pathways & Ar...
Who’s Driving Your Brand: Navigating Today’s Confusing Customer Pathways & Ar...Who’s Driving Your Brand: Navigating Today’s Confusing Customer Pathways & Ar...
Who’s Driving Your Brand: Navigating Today’s Confusing Customer Pathways & Ar...Teradata
 
The Tools You Need to Build Relationships and Drive Revenue Checklist
The Tools You Need to Build Relationships and Drive Revenue Checklist The Tools You Need to Build Relationships and Drive Revenue Checklist
The Tools You Need to Build Relationships and Drive Revenue Checklist Teradata
 
Agile Marketing: How Companies Keep Pace in an Always-On World
Agile Marketing: How Companies Keep Pace in an Always-On World Agile Marketing: How Companies Keep Pace in an Always-On World
Agile Marketing: How Companies Keep Pace in an Always-On World Teradata
 
Right Message, Right Time: The Secrets to Scaling Email Success
Right Message, Right Time: The Secrets to Scaling Email Success Right Message, Right Time: The Secrets to Scaling Email Success
Right Message, Right Time: The Secrets to Scaling Email Success Teradata
 
A New Way of Thinking: Mobile Isn't Just a New Customer Channel
A New Way of Thinking: Mobile Isn't Just a New Customer ChannelA New Way of Thinking: Mobile Isn't Just a New Customer Channel
A New Way of Thinking: Mobile Isn't Just a New Customer ChannelTeradata
 
10 Ways to Jumpstart Your Data-Driven Marketing Efforts [Infographic]
10 Ways to Jumpstart Your Data-Driven Marketing Efforts [Infographic]10 Ways to Jumpstart Your Data-Driven Marketing Efforts [Infographic]
10 Ways to Jumpstart Your Data-Driven Marketing Efforts [Infographic]Teradata
 
Data-Driven Marketing Survey
Data-Driven Marketing SurveyData-Driven Marketing Survey
Data-Driven Marketing SurveyTeradata
 
Social Data at Work
Social Data at WorkSocial Data at Work
Social Data at WorkTeradata
 
Social Marketing: Insight and Response
Social Marketing: Insight and ResponseSocial Marketing: Insight and Response
Social Marketing: Insight and ResponseTeradata
 
Robust Analytics for Health Plans in an Era of Reform
Robust Analytics for Health Plans in an Era of ReformRobust Analytics for Health Plans in an Era of Reform
Robust Analytics for Health Plans in an Era of ReformTeradata
 
Teradata BSI: Case of the Retail Turnaround
Teradata BSI: Case of the Retail Turnaround Teradata BSI: Case of the Retail Turnaround
Teradata BSI: Case of the Retail Turnaround Teradata
 
FRaCT Webinar Deck
FRaCT Webinar DeckFRaCT Webinar Deck
FRaCT Webinar DeckTeradata
 
Meeting Customers Where They Live
Meeting Customers Where They LiveMeeting Customers Where They Live
Meeting Customers Where They LiveTeradata
 
SAS and Teradata Analytic Superheroes
SAS and Teradata Analytic SuperheroesSAS and Teradata Analytic Superheroes
SAS and Teradata Analytic SuperheroesTeradata
 
Workflow Best Practices - DeVry University
Workflow Best Practices - DeVry UniversityWorkflow Best Practices - DeVry University
Workflow Best Practices - DeVry UniversityTeradata
 

Mais de Teradata (20)

How to Use Algorithms to Scale Digital Business
How to Use Algorithms to Scale Digital BusinessHow to Use Algorithms to Scale Digital Business
How to Use Algorithms to Scale Digital Business
 
SENTIENT ENTERPRISE
SENTIENT ENTERPRISESENTIENT ENTERPRISE
SENTIENT ENTERPRISE
 
What Does It Mean to Digitize a Company?
What Does It Mean to Digitize a Company?What Does It Mean to Digitize a Company?
What Does It Mean to Digitize a Company?
 
Teradata Listener™: Radically Simplify Big Data Streaming
Teradata Listener™: Radically Simplify Big Data StreamingTeradata Listener™: Radically Simplify Big Data Streaming
Teradata Listener™: Radically Simplify Big Data Streaming
 
It’s Not Enough to Just Collect Data
It’s Not Enough to Just Collect DataIt’s Not Enough to Just Collect Data
It’s Not Enough to Just Collect Data
 
Who’s Driving Your Brand: Navigating Today’s Confusing Customer Pathways & Ar...
Who’s Driving Your Brand: Navigating Today’s Confusing Customer Pathways & Ar...Who’s Driving Your Brand: Navigating Today’s Confusing Customer Pathways & Ar...
Who’s Driving Your Brand: Navigating Today’s Confusing Customer Pathways & Ar...
 
The Tools You Need to Build Relationships and Drive Revenue Checklist
The Tools You Need to Build Relationships and Drive Revenue Checklist The Tools You Need to Build Relationships and Drive Revenue Checklist
The Tools You Need to Build Relationships and Drive Revenue Checklist
 
Agile Marketing: How Companies Keep Pace in an Always-On World
Agile Marketing: How Companies Keep Pace in an Always-On World Agile Marketing: How Companies Keep Pace in an Always-On World
Agile Marketing: How Companies Keep Pace in an Always-On World
 
Right Message, Right Time: The Secrets to Scaling Email Success
Right Message, Right Time: The Secrets to Scaling Email Success Right Message, Right Time: The Secrets to Scaling Email Success
Right Message, Right Time: The Secrets to Scaling Email Success
 
A New Way of Thinking: Mobile Isn't Just a New Customer Channel
A New Way of Thinking: Mobile Isn't Just a New Customer ChannelA New Way of Thinking: Mobile Isn't Just a New Customer Channel
A New Way of Thinking: Mobile Isn't Just a New Customer Channel
 
10 Ways to Jumpstart Your Data-Driven Marketing Efforts [Infographic]
10 Ways to Jumpstart Your Data-Driven Marketing Efforts [Infographic]10 Ways to Jumpstart Your Data-Driven Marketing Efforts [Infographic]
10 Ways to Jumpstart Your Data-Driven Marketing Efforts [Infographic]
 
Data-Driven Marketing Survey
Data-Driven Marketing SurveyData-Driven Marketing Survey
Data-Driven Marketing Survey
 
Social Data at Work
Social Data at WorkSocial Data at Work
Social Data at Work
 
Social Marketing: Insight and Response
Social Marketing: Insight and ResponseSocial Marketing: Insight and Response
Social Marketing: Insight and Response
 
Robust Analytics for Health Plans in an Era of Reform
Robust Analytics for Health Plans in an Era of ReformRobust Analytics for Health Plans in an Era of Reform
Robust Analytics for Health Plans in an Era of Reform
 
Teradata BSI: Case of the Retail Turnaround
Teradata BSI: Case of the Retail Turnaround Teradata BSI: Case of the Retail Turnaround
Teradata BSI: Case of the Retail Turnaround
 
FRaCT Webinar Deck
FRaCT Webinar DeckFRaCT Webinar Deck
FRaCT Webinar Deck
 
Meeting Customers Where They Live
Meeting Customers Where They LiveMeeting Customers Where They Live
Meeting Customers Where They Live
 
SAS and Teradata Analytic Superheroes
SAS and Teradata Analytic SuperheroesSAS and Teradata Analytic Superheroes
SAS and Teradata Analytic Superheroes
 
Workflow Best Practices - DeVry University
Workflow Best Practices - DeVry UniversityWorkflow Best Practices - DeVry University
Workflow Best Practices - DeVry University
 

Último

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

How We Did It: The Case of the Credit Card Breach

  • 1. How We Did The Investigations “ The Case of the Credit Card Breach” Brought to you by and
  • 2.
  • 3.
  • 4.
  • 5. Taylor & Swift PCI DSS Security Audit Taylor & Swift passed an external PCI DSS audit that showed their systems to be compliant with the PCI DSS industry standard for protecting credit cards. Bob Shields gave a copy of the report to both Frazier and Lola to study
  • 6. Taylor & Swift System Architecture (From PCI Audit) Lola notes that this is a common retail system architecture where credit card transactions collected at stores or the web flow through data centers to an EDW and ultimately to Back Up.
  • 7. T&S’s Front-End (Store and Web, Data Center) Data Flow Processes and System Architecture T&S mini-batch loads POS data every hour to the data centers. Web transactions drop immediately into the data centers. The multiple data centers offer high availability as well as disaster recovery, in addition to workload balancing.
  • 8. Taylor and Swift Back-Office Data Flows Data centers are used for inventory and ERP financial applications. Data flows at 1 hour intervals into Teradata for marketing and merchandising purposes.
  • 9.
  • 10.
  • 11.
  • 12. Lola Investigated the Front-End Systems Lola worked with the Store and Web IT Groups. The system had a full PCI audit review and approval. This led the team to investigate the Front-End Systems. All systems came out clean with no intrusions and the data is protected from the swipe through the point where the transaction data moves to the data centers.
  • 13. Frazier Investigated the Back-End Systems Frazier worked with the back-end team to investigate how credit cards are handled in the back-end processing at the data centers. The back-end system also had a full PCI audit review and approval. The back-end systems came out clean with no intrusions and the data is protected inside the back-end systems.
  • 14. Frazier Checked the Role - and Time-Based Security Access Controls That Were Set Up In the case of the Credit Card Field, Protegrity’s tool defined 2 roles – one with High clearance, and one with Low, with access permission to the data only for High clearance only during daytime working hours. Frazier found that the Protegrity policy controls that were initially set up were not changed – no security hole there.
  • 15. Frazier Ran A Protegrity Detailed Report on the Card Number Column – Decrease was the Clue! Frazier dug into the Protegrity reports on key data elements. In this case, the Production Credit Card Number – and found a suspicious dip in the number of daily touches.
  • 16. Frazier Inspected Credit Card Column Access Frazier drilled down on each of the repositories and found that the touches of the Credit Card data in the SQL Servers dropped to 0
  • 17. Core Problem: IT Swapped Out Protected Operational Data Stores at the Data Center, Forgot to Protect Lola and Frazier had a call with the Data Center IT Manager and found out that the staging databases had been changed - from SQL Server databases to another 3 rd party database. No PCI audit was done after the switch and the new databases had not been protected.
  • 18. Audit Logs in SQL Servers in the Data Centers Show Suspicious Activity by a DBA Lola went back to the Log activity on the unprotected system and found some unusual SELECT * activities on Orders and Customers. The queries were executed by a DBA at the Las Vegas Data Center by the name of Joe Nagle.
  • 19. Records from DBA Query Matched the List Pull Against the Complaining Customers Frazier ran a query to JOIN the 500 records with the complaints with the credit card transactions. All customers who were breached had shown the fraudulent activity in the unprotected database. They all matched!
  • 20. The Culprit: Joe Nagel, DBA Lola worked with the data center IT people to pull the security tapes to make sure Joe was working that day … here he is exiting the facility in the early morning hours. Bob then confiscated his PC and found customer credit card information on his laptop. NABBED!
  • 21.
  • 22.
  • 23.

Notas do Editor

  1. Much of the power in the Protegrity solution comes from way security policies capture all of the details on data protection within an organization. By bringing all of this information together in one place, the environment becomes quite simple to manage, with all of the requisite transparency security regulations require. We’ll see how each of these things are handled by DPS.
  2. Key Talking Points: Opportunity to discuss the complexities and importance of protecting data throughout the enterprise – from acquisition to archive or deletion. This slide builds on the previous graphic which introduced Protegrity’s ‘comprehensive’ Solutions and prepares for the next slide which discusses the different data protection options provided by Protegrity. [1] Collection Begin to paint the ‘real-life’ picture about data being collected from multiple access points (Web, POS, remote locations, applications, etc.). Point out that the data being collected may also have already been encrypted using different ‘keys’ from different systems. Explain that Protegrity provides an API to help bring that diverse information together for aggregation. [2] Aggregation Continue painting the data flow process by explaining the need to protect and ‘normalize’ the data coming from multiple ‘key zones’ into one protected ‘key zone’ that prepares the data to advance to the necessary operational systems for use within the organization. These operational systems may also have their own separate ‘zone’ requirements. Explain that Protegrity can provide both database and application protection at this stage of the data flow process within the organization. Key management becomes increasingly important. [3] Operations Continue defining the data flow process by highlighting the complexity of managing the data and associated data security keys at the operational level, which may contain many different applications, databases and technologies that rely on independent data protection. Explain that Protegrity can provide ‘homogeneous’ data protection across those operational environments by leveraging database, file and application level protection, depending on their requirements and technology landscape. [4] Analysis Continue the data flow discussion by introducing the data flowing into the data warehouse. Mention the need to be able to protect the sensitive data at the column level, due to the potential volumes of data that might exist within these large data warehouses. Also mention the additional need for high performance and scalability, due to the business analysis that is derived from the DW. Explain that Protegrity provides database protection for some of the largest data warehouses, across most industries. This is a great time to introduce our Teradata relationship and the value proposition Protegrity brings to the TD EDW. [5]Storage Complete the ‘from acquisition to archive or deletion’ data flow by highlighting the need to eventually off-load and store the large volumes of historical collected data, outside of the data warehouse for efficiency purposes -- but in a protected environment. (You might mentions some wars stories about tapes falling off the back of a truck, at this point). Explain that Protegrity can provide a secure archived environment, by protecting data that has been encrypted throughout the organization and storing it in their preferred back-up devices using Protegrity’s database and file protection capabilities. Most importantly, the data in these archived systems can be restored if and when necessary . Finally, reintroduce the importance of having a centralized and comprehensive key management system to manage the encryption and decryption process at each stage of the enterprise data flow. Additionally, it is a great time to re-introduce the concept of Risk Adjusted Data Security and the need for having multiple methods to secure the data across each stage. It also will bridge to the next slide.