Security Market Segment LS
×

Message

Failed loading XML... Document is empty
Saturday, 07 April 2012 17:53

Mark Goudie muses on data breaches

By

How are breaches detected and what should be done to assist the process?  Mark Goudie from Verizon offers some thoughts.

 

In the light of the recent Global Payments credit card breach, iTWire spoke with Mark Goudie, Verizon Business' Asia Pacific investigative response managing principal.

Being one of the authors of Verizon's annual Data Breach Investigations Report, we felt his thoughts may be of interest to readers.

iTWire: How are breaches, such as the recent one at Global Payments, typically uncovered?

Mark Goudie: The most common data breach detection method for payment cards is Central Point of Purchase analysis.  This technique looks for merchants where cards that have shown fraudulent transactions were used validly.  Where you have a cluster of cards that were used at a merchant that have shown subsequent fraud you have a Central Point of Purchase (CPP).

iTWire: But of course, this time the breach wasn't at the merchant level.

Mark Goudie: That technique is very successful and quickly identifies the compromised merchant, but when any data aggregator is compromised the CPP analysis makes it look like a whole group of merchants has been compromised and it can take some time to work out where the problem lies.

Data aggregators have a far better track record than merchants, but they do offer a more attractive target for organised crime than merchants due to the volume of data they process.

iTWire: Of course the whole process is supposedly governed by the rules of the Payment Card Industry Data Security Standard (PCI-DSS), but we have heard of too many occasions where desperation sets in when the annual or semi-annual audit is almost due and the whole IT team is set vigorously upon the task of satisfying the audit before returning to their normal ways.

Mark Gaudie: As always, security and the PCI-DSS is a 24 x 7 exercise.  For modern organisations, the days where improving security just for a security assessment are a thing of the past.  Security has to be checked by the data owner because if they do not rectify a problem that creeps into their environment someone will exploit it and the problem will come to their attention for all the wrong reasons.

iTWire: so, we now know what happened - hackers broke into Global Payments.  Is that where the role of a company like Verizon ends?

Mark Goudie: The facts of a data breach evolve dramatically over the course of a data breach investigation and it is often many weeks or months into the case before the investigators have a good understanding of exactly what happened.  Looking at whether incidents are linked very early in any investigation is dangerous and will typically take some time for the facts to come to light.

iTWire: so that means we shouldn't expect to hear definitive outcomes from the investigation for some time to come?

Mark Goudie: If ever.

 
Read 5191 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




EXL AI IN ACTION VIRTUAL EVENT 20 MARCH 2025

Industry leaders are looking to transform their businesses and achieve measurable outcomes with AI.

As organisations across APAC navigate the complexities of AI adoption, this must-attend event brings together industry leaders, real-world demonstrations, and visionary panel discussions to bridge the gap between proof-of-concepts and enterprise-wide AI implementation.

Learn how to overcome common challenges in deploying AI at scale.​

Unlock cost savings, efficiency, and better customer experiences with AI.

Discover how industry expertise and data intelligence enable practical AI deployment.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
David Heath

David Heath has had a long and varied career in the IT industry having worked as a Pre-sales Network Engineer (remember Novell NetWare?), General Manager of IT&T for the TV Shopping Network, as a Technical manager in the Biometrics industry, and as a Technical Trainer and Instructional Designer in the industrial control sector. In all aspects, security has been a driving focus. Throughout his career, David has sought to inform and educate people and has done that through his writings and in more formal educational environments.

Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments