BreachExchange mailing list archives
Re: Update: Heartland breach shows why compliance is not enough
From: Dotzero <dotzero () gmail com>
Date: Thu, 7 Jan 2010 10:31:52 -0500
The fact that Robert Carr claims compliance is not validation that Heartland actually was compliant. Given the timeframes involved (duration of the breach) and the fact that the problem was apparently brought to their attention by the card companies, it is hard to believe that Heartland actually was compliant. The fact that Mr. Carr got religion after the breach and now recognizes that compliance does not equal security is a man bites dog story. Just my 2 cents as an outside observer. On Thu, Jan 7, 2010 at 3:59 AM, security curmudgeon <jericho () attrition org> wrote:
---------- Forwarded message ---------- From: InfoSec News <alerts () infosecnews org> http://www.computerworld.com/s/article/9143158/Update_Heartland_breach_shows_why_compliance_is_not_enough?taxonomyId=17 By Jaikumar Vijayan Computerworld January 6, 2010 Nearly a year after Heartland Payment Systems Inc. disclosed what turned out to be the biggest breach involving payment card data, the incident remains a potent example of how compliance with industry standards is no guarantee of security. Princeton, N.J.-based Heartland last Jan. 20 disclosed that intruders had broken into its systems and stolen data on what was later revealed to be a staggering 130 million credit and debit cards. That number easily eclipsed the 94 million cards that were compromised in the massive breach disclosed by TJX Companies Inc. in 2007. However, it wasn't just the scope of the Heartland breach that made it remarkable, but also the company's insistence that it was certified as fully compliant with the requirements of the Payment Card Industry Data Security Standard (PCI DSS) when it was compromised. In public comments after the breach, Heartland CEO Robert Carr emphatically claimed the intrusion occurred even though the company had implemented every single one of the security controls mandated by the PCI standard. In an interview with Computerworld last June, Carr said the breach pointed to both the sophistication of the attacks against Heartland and the inadequacy of relying on PCI controls alone for data security. [...] _______________________________________________ Dataloss-discuss Mailing List (dataloss-discuss () datalossdb org) Archived at http://seclists.org/dataloss/ Get business, compliance, IT and security staff on the same page with CREDANT Technologies: The Shortcut Guide to Understanding Data Protection from Four Critical Perspectives. The eBook begins with considerations important to executives and business leaders. http://www.credant.com/campaigns/ebook-chpt-one-web.php
_______________________________________________ Dataloss-discuss Mailing List (dataloss-discuss () datalossdb org) Archived at http://seclists.org/dataloss/ Get business, compliance, IT and security staff on the same page with CREDANT Technologies: The Shortcut Guide to Understanding Data Protection from Four Critical Perspectives. The eBook begins with considerations important to executives and business leaders. http://www.credant.com/campaigns/ebook-chpt-one-web.php
Current thread:
- Update: Heartland breach shows why compliance is not enough security curmudgeon (Jan 07)
- Re: Update: Heartland breach shows why compliance is not enough Dotzero (Jan 07)