<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: The PCI Solution?</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=103" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=103</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Steve Friedberg</title>
		<link>http://spiresecurity.com/?p=103&#038;cpage=1#comment-101</link>
		<dc:creator>Steve Friedberg</dc:creator>
		<pubDate>Fri, 30 Jan 2009 17:28:53 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=103#comment-101</guid>
		<description><![CDATA[Pete:
FWIW...too many companies may use the PCI standards as a CYA tactic.  Rather than do what&#039;s really needed to minimize the risk of unauthorized access, they can simply follow PCI, and throw up their hands if/when that access occurs and say, &quot;well, we did what PCI asked of us.&quot;

I like Andrew&#039;s approach of simply setting out the objectives, and leaving it to the industry to determine the best way of getting to the finish line.  In this cat-and-mouse environment, that &quot;best way&quot; will be consistently changing, which means hard-and-fast regulations that work today may be hopelessly outmoded tomorrow.

But then, I&#039;m just a PR flack...what do I know?
]]></description>
		<content:encoded><![CDATA[<p>Pete:<br />
FWIW&#8230;too many companies may use the PCI standards as a CYA tactic.  Rather than do what&#8217;s really needed to minimize the risk of unauthorized access, they can simply follow PCI, and throw up their hands if/when that access occurs and say, &#8220;well, we did what PCI asked of us.&#8221;</p>
<p>I like Andrew&#8217;s approach of simply setting out the objectives, and leaving it to the industry to determine the best way of getting to the finish line.  In this cat-and-mouse environment, that &#8220;best way&#8221; will be consistently changing, which means hard-and-fast regulations that work today may be hopelessly outmoded tomorrow.</p>
<p>But then, I&#8217;m just a PR flack&#8230;what do I know?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Andrew Conry-Murray</title>
		<link>http://spiresecurity.com/?p=103&#038;cpage=1#comment-100</link>
		<dc:creator>Andrew Conry-Murray</dc:creator>
		<pubDate>Fri, 30 Jan 2009 15:59:32 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=103#comment-100</guid>
		<description><![CDATA[Hi Anton,

People who don&#039;t know what &quot;reducing risk&quot; mean can use the PCI standards as a voluntary framework. They can also take other steps available to them--hire consultants, talk to peers, use an MSSP, etc.

Under the current PCI framework, companies have more incentive to become &quot;compliant&quot; than they do to actually manage risk. That&#039;s backwards. My idea is to enforce the intent of PCI--manage the risk--without mandating the path you take to get there.



]]></description>
		<content:encoded><![CDATA[<p>Hi Anton,</p>
<p>People who don&#8217;t know what &#8220;reducing risk&#8221; mean can use the PCI standards as a voluntary framework. They can also take other steps available to them&#8211;hire consultants, talk to peers, use an MSSP, etc.</p>
<p>Under the current PCI framework, companies have more incentive to become &#8220;compliant&#8221; than they do to actually manage risk. That&#8217;s backwards. My idea is to enforce the intent of PCI&#8211;manage the risk&#8211;without mandating the path you take to get there.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=103&#038;cpage=1#comment-99</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Fri, 30 Jan 2009 15:06:55 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=103#comment-99</guid>
		<description><![CDATA[@Anton -

And they would have that right, to a certain extent. Don&#039;t forget that there are plenty of other restrictions out there for negligence and liability. The idea here, if I understand correctly, is simply to penalize the negative consequences. Some folks might, for example, opt to insure against the risk rather than implementing prescriptive controls which haven&#039;t been validated as being useful.

Pete
]]></description>
		<content:encoded><![CDATA[<p>@Anton -</p>
<p>And they would have that right, to a certain extent. Don&#8217;t forget that there are plenty of other restrictions out there for negligence and liability. The idea here, if I understand correctly, is simply to penalize the negative consequences. Some folks might, for example, opt to insure against the risk rather than implementing prescriptive controls which haven&#8217;t been validated as being useful.</p>
<p>Pete</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anton Chuvakin</title>
		<link>http://spiresecurity.com/?p=103&#038;cpage=1#comment-98</link>
		<dc:creator>Anton Chuvakin</dc:creator>
		<pubDate>Fri, 30 Jan 2009 15:00:18 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=103#comment-98</guid>
		<description><![CDATA[Well, it is idealistic since I think under that new system a lot of people will say &quot;OK, risk assessment ... Got it - we have no risk! Proceeding to do nothing, as usual&quot;
]]></description>
		<content:encoded><![CDATA[<p>Well, it is idealistic since I think under that new system a lot of people will say &#8220;OK, risk assessment &#8230; Got it &#8211; we have no risk! Proceeding to do nothing, as usual&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Chris</title>
		<link>http://spiresecurity.com/?p=103&#038;cpage=1#comment-97</link>
		<dc:creator>Chris</dc:creator>
		<pubDate>Wed, 28 Jan 2009 03:03:53 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=103#comment-97</guid>
		<description><![CDATA[Interesting proposal.  An essential element which I don&#039;t see mentioned explicitly would be requiring firms to divulge their costs due to breaches.  This way, the firms can do as they please, but customers have the data they need to determine where to buy.
]]></description>
		<content:encoded><![CDATA[<p>Interesting proposal.  An essential element which I don&#8217;t see mentioned explicitly would be requiring firms to divulge their costs due to breaches.  This way, the firms can do as they please, but customers have the data they need to determine where to buy.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=103&#038;cpage=1#comment-96</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Tue, 27 Jan 2009 22:39:29 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=103#comment-96</guid>
		<description><![CDATA[@Anton -

There are a number of control frameworks that exist in the security profession - and PCI is out there, so that could be used as a guide as well. Heck, how does anyone trying to comply with SOX know what to do? They don&#039;t follow SOX, they ask their auditors and security pros.

Andrew&#039;s &quot;paper&quot; was a blog post, so not a whole lot of details there. I don&#039;t really see what is idealistic about it - it seems fairly straightforward to me, and perhaps more importantly, it is run by private enterprise so they could actually rewrite the rules to rewrite PCI to focus on penalties and not on controls.
]]></description>
		<content:encoded><![CDATA[<p>@Anton -</p>
<p>There are a number of control frameworks that exist in the security profession &#8211; and PCI is out there, so that could be used as a guide as well. Heck, how does anyone trying to comply with SOX know what to do? They don&#8217;t follow SOX, they ask their auditors and security pros.</p>
<p>Andrew&#8217;s &#8220;paper&#8221; was a blog post, so not a whole lot of details there. I don&#8217;t really see what is idealistic about it &#8211; it seems fairly straightforward to me, and perhaps more importantly, it is run by private enterprise so they could actually rewrite the rules to rewrite PCI to focus on penalties and not on controls.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anton Chuvakin</title>
		<link>http://spiresecurity.com/?p=103&#038;cpage=1#comment-95</link>
		<dc:creator>Anton Chuvakin</dc:creator>
		<pubDate>Tue, 27 Jan 2009 22:30:01 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=103#comment-95</guid>
		<description><![CDATA[Pete, what would people who don&#039;t know what &quot;put that energy and money into actually reducing risk&quot; mean do in this scenario?  I read the paper and thought that it is too idealistic.
]]></description>
		<content:encoded><![CDATA[<p>Pete, what would people who don&#8217;t know what &#8220;put that energy and money into actually reducing risk&#8221; mean do in this scenario?  I read the paper and thought that it is too idealistic.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
