There’s a Plan for That | Cybersecurity Incident Response & the PCI DSS

There’s a Plan for That | Cybersecurity Incident Response & the PCI DSS

In a recent post, we discussed the challenges associated with attesting to the Payment Card Industry’s Data Security Standard (PCI DSS) compliance, including frequent oversights we encounter while conducting security due diligences and gap analyses for our clients. See “Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)” from our recent series of blogs on...

Read More
Isolating the Cardholder Data Environment with Network Segmentation

Isolating the Cardholder Data Environment with Network Segmentation

In a recent post, we discussed many of the challenges with attesting to PCI DSS compliance, including a description of some of the factors that are often overlooked when defining the cardholder data environment (CDE). See “Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)” from our recent series of blogs on PCI DSS-related topics for more information. …

Read More
Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)

Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)

In a recent post, we discussed what PCI DSS is, why it matters, and the release of the latest version, including a summary of the changes and the impact of each. See “What PCI DSS version 3.2 means for you” for more information. In 2016, West Monroe Partners has conducted over 140 IT diligences on behalf of private equity firms and strategic buyers across a number of industries as...

Read More
What PCI DSS Version 3.2 Means for You

What PCI DSS Version 3.2 Means for You

The Payment Card Industry Security Standards Council (PCI SSC) recently released version 3.2 of their Data Security Standard (PCI DSS v3.2).  The PCI DSS is a global standard designed to protect payment card data.  It applies to any organization that accepts or processes payment cards, and lays out a comprehensive compliance program designed to define how organizations should implement...

Read More
Cyber-attack in Ukraine a Red Flag for Power Distribution Networks

Cyber-attack in Ukraine a Red Flag for Power Distribution Networks

‘..the first known power outage caused by hackers and also the most complex cyber-attack on infrastructure to date.’ The Institute of Engineering and Technology, Jan 19, 2016 On December 23, 2015 an outage in Western Ukraine’s Prykarpattya Oblenergo and Kyivoblenergo power distribution networks lost power between three to six hours, affecting between 80,000-700,000 customers.…

Read More

Adopting DataGuard? Things to consider

As utilities continue to leverage innovative Smart Grid technologies to transform operations and provide customers with new and improved services, they also collect an increasing amount of customer data. This data is useful for many operational purposes and the utilities are just discovering ways to leverage this information. In January 2015, the White House and the Department of Energy...

Read More

MAS Radio: A critical but aging link for SCADA – Part 1

For years, Multiple Address (MAS) radio has been a popular solution used by utilities to reach and aggregate remote terminal units (RTUs). It is widely used by electric utilities, the oil and gas pipeline industry, water and wastewater systems, and railroads – allowing communications with remote devices that are critical to the reliable and safe operation of the systems which they are part...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons