VISIT LIBRARY SPONSOR A BOOK HOW IT WORKS NEWSLETTER FEEDBACK

The Essentials Series: PCI Compliance

by Rebecca Herold

SYNOPSIS

In The Essentials Series: PCI Compliance, compliance expert Rebecca Herold discusses and demonstrates how meeting the PCI DSS requirements for logging also benefits businesses by putting into place log management practices that:

  • Help to identify when authorized users may be doing things they should not be doing.
  • Help to reveal when unauthorized users from outside the network perimeter have breached the network.
  • Reveal vulnerabilities within applications that could have led to information security incidents and privacy breaches if they were not discovered.
Within these papers, Rebecca includes real life examples, along with insights from QSA auditors and log management experts.


CHAPTER PREVIEWS

Article 1: Using PCI DSS Compliant Log Management To Identify Insider Access Abuse

In the first article, Rebecca Herold discusses and demonstrates how meeting the PCI DSS requirements for logging also benefits businesses by putting into place logs that help to identify when authorized users may be doing things they should not be doing.


Article 2: Using PCI DSS Compliant Log Management To Identify Attacks From The Outside

In the second article, Rebecca Herold discusses and demonstrates how meeting the PCI DSS requirements for logging also benefits businesses by putting into place logs that help to reveal when unauthorized users have breached the network.


Article 3: Addressing Application Vulnerabilities with PCI Log Management Compliance

In the last article, Rebecca Herold discusses and demonstrates how meeting the PCI DSS requirements for logging benefits businesses by putting into place logs that reveal vulnerabilities within applications that could have led to information security incidents and privacy breaches if they were not discovered.