<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0"><id>tag:blogger.com,1999:blog-783068595654475782</id><updated>2024-09-04T16:00:57.780+01:00</updated><category term="Getting started"/><category term="moving forward"/><category term="awareness"/><category term="business"/><category term="Data Classification"/><category term="Data ownership"/><category term="Taking responsibility"/><category term="compliance"/><category term="tjx"/><category term="1st Post"/><category term="Audit"/><category term="Consumer Issues"/><category term="Encryption"/><category term="PCI Answers"/><category term="blogging"/><category term="distraction"/><category term="follow up"/><category term="wireless"/><title type="text">InfoSec and PCI from Scratch</title><subtitle type="html">This is a blog about the process of setting up an Information Security Programme within a company not known for it's InfoSec awareness.  In addition, it will comment on the process of delivering a project to make the company PCI DSS compliant.</subtitle><link href="http://infosecandpcifromscratch.blogspot.com/feeds/posts/default" rel="http://schemas.google.com/g/2005#feed" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/" rel="alternate" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><generator uri="http://www.blogger.com" version="7.00">Blogger</generator><openSearch:totalResults>24</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-1637021670127533607</id><published>2007-07-11T08:06:00.000+01:00</published><updated>2007-07-11T08:16:01.881+01:00</updated><title type="text">So much to do, so little time</title><summary type="text">I am sooooo behind on my blog / news reading at the moment as I have no time to think let alone post. And believe me, it take me a long time to think about anything.....I have a lot of catching up to do (Bloglines tells me I have over 1200 items unread!! :-( ) but don't have the time I'm afraid. This is due to:Projects at work finally getting traction and being inundated by useful questions from </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/1637021670127533607/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/1637021670127533607" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/1637021670127533607" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/1637021670127533607" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/07/so-much-to-do-so-little-time.html" rel="alternate" title="So much to do, so little time" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-988574974828779759</id><published>2007-06-26T07:30:00.000+01:00</published><updated>2007-06-26T07:38:30.612+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Audit"/><title type="text">The new audit defense?</title><summary type="text">I’ve seen a trend recently although it’s probably been around for ages but I’ve only just noticed.In many cases where an organisation’s security has been compromised, either the organisation itself or the investigative body sent in to look into the situation have responded to direct questions with vague, non-committal answers.This approach first caught my eye with the TJX situation where both the</summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/988574974828779759/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/988574974828779759" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/988574974828779759" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/988574974828779759" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/06/new-audit-defense.html" rel="alternate" title="The new audit defense?" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-8959703203383418299</id><published>2007-06-24T11:19:00.000+01:00</published><updated>2007-06-24T21:15:23.289+01:00</updated><title type="text">I don't understand</title><summary type="text">I don't understand the lack of focussed PCI DSS related sites on the internet.  Considering the depth of the requirements and the coverage area that it can have on organisations' network systems and business processes, I would have thought that there would be a lot more.There is the following dedicated site:- PCI Answerswhich is a good source of general info.  I like it (and contribute when </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/8959703203383418299/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/8959703203383418299" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/8959703203383418299" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/8959703203383418299" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/06/i-dont-understand.html" rel="alternate" title="I don't understand" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-1039343426552684946</id><published>2007-06-21T20:22:00.000+01:00</published><updated>2007-06-21T20:26:07.680+01:00</updated><title type="text">Time flies when you're, erm, busy....</title><summary type="text">WOW!!!!  13 days since I last posted, I can't believe it.Well, I've been on a few management courses, had a couple of days off and dealt with a few issues with the Acquirer.No excuse though, I'll pull my finger out over the weekend and post something (providing I have something to say, I don't believe in posting for the sake of it).</summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/1039343426552684946/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/1039343426552684946" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/1039343426552684946" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/1039343426552684946" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/06/time-flies-when-youre-erm-busy.html" rel="alternate" title="Time flies when you're, erm, busy...." type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-9107787105776991281</id><published>2007-06-08T10:33:00.000+01:00</published><updated>2007-06-08T10:38:13.344+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="Consumer Issues"/><title type="text">The “customer concern” argument for InfoSec is dead</title><summary type="text">Various news outlets are reporting that TJX has now been named in over 20 law suits, some class action.  HarborOne Credit Union has apparently billed TJX $590k for  costs and damage to brand .TJX have reported an increase in sales of 5% according to  Reuters  yesterday.  Analysts ere apparently expecting 3.9% so on that basis it has out performed market expectations.TJX’s share price dipped by </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/9107787105776991281/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/9107787105776991281" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/9107787105776991281" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/9107787105776991281" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/06/customer-concern-argument-for-infosec.html" rel="alternate" title="The “customer concern” argument for InfoSec is dead" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-4097616363235572183</id><published>2007-06-06T13:31:00.000+01:00</published><updated>2007-06-06T13:34:00.314+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><title type="text">Approach to Encryption within PCI DSS</title><summary type="text"> Dave Whitelegg  raises a point that’s been niggling me for a while.  For all the good in the PCI DSS, the whole process gets considerably weakened by the Acquiring banks insistance on the transmission of data from merchant’s system to acquiring bank’s systems in plain text.  Sure, the transmission channel is SSL encrypted over a point to point / VPN link but the data is still unencrypted and </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/4097616363235572183/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/4097616363235572183" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/4097616363235572183" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/4097616363235572183" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/06/approach-to-encryption-within-pci-dss.html" rel="alternate" title="Approach to Encryption within PCI DSS" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-1227384852280636276</id><published>2007-06-05T19:31:00.000+01:00</published><updated>2007-06-05T19:33:48.620+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="awareness"/><title type="text">I've been assessed!!!!</title><summary type="text">The Company has organised some management training courses and the first entitled “Personal Leadership Style” was today.  Why is this InfoSec relevant?  Well, I’ll tell you later.The day was good, in my opinion.  I don’t think I learnt anything new about myself (which was sort of the point) but learnt a lot about “leadership styles”.  There were a number of practical exercises and assessment </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/1227384852280636276/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/1227384852280636276" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/1227384852280636276" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/1227384852280636276" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/06/ive-been-assessed.html" rel="alternate" title="I've been assessed!!!!" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-6384373090089105164</id><published>2007-06-04T15:28:00.000+01:00</published><updated>2007-06-04T15:41:41.884+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="awareness"/><category scheme="http://www.blogger.com/atom/ns#" term="moving forward"/><title type="text">The Company Newsletter article</title><summary type="text">As you will know, I have an issue with awareness in my Company.  To that end, I agreed to write a short article for the company newsletter on me and InfoSec in general.I remembered guidance I received from  Rob Newby  on keeping things short and sweet so as not to scare off the reader so the fir st article is exactly that.  I'm going to write some follow up articles on InfoSec in general and PCI </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/6384373090089105164/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/6384373090089105164" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/6384373090089105164" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/6384373090089105164" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/06/company-newsletter-article.html" rel="alternate" title="The Company Newsletter article" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-5945097359349644836</id><published>2007-06-02T09:18:00.000+01:00</published><updated>2007-06-02T09:29:39.287+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="blogging"/><title type="text">Blog news</title><summary type="text">As you know, I have recently started this blog and am new to the blogosphere itself.  I'm learning a lot, not least of which is that things don't always work as they should.Blogger does not use trackbacks as most other blog hosting services appear to do.  They use "backlinks" but I have been unable to get them to work.  So, I've enabled  Haloscan  and you should now see the Trackback link at the </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/5945097359349644836/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/5945097359349644836" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/5945097359349644836" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/5945097359349644836" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/06/blog-news.html" rel="alternate" title="Blog news" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-4121918758588922120</id><published>2007-06-01T09:08:00.000+01:00</published><updated>2007-06-01T09:22:19.478+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="awareness"/><category scheme="http://www.blogger.com/atom/ns#" term="moving forward"/><title type="text">Spreading the word</title><summary type="text">Well, I’ve written the article for the company newsletter about me and what I do.  I’ve kept it short and sweet on purpose so as not to:a) bore people stupidb) use up all my material at onceI intend to do further articles to elaborate on “what InfoSec is” and “how it works within the company”.  That last item should be a short sentence!!!  My PCI DSS Project Manager has produced another article </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/4121918758588922120/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/4121918758588922120" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/4121918758588922120" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/4121918758588922120" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/06/spreading-word.html" rel="alternate" title="Spreading the word" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-5938905177266623386</id><published>2007-05-31T08:59:00.000+01:00</published><updated>2007-05-31T09:01:38.252+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Classification"/><category scheme="http://www.blogger.com/atom/ns#" term="Data ownership"/><category scheme="http://www.blogger.com/atom/ns#" term="moving forward"/><title type="text">Maybe some progress at last.....</title><summary type="text">Well, well....  Maybe we’re getting somewhere.  If you’ve read my previous posts you’ll know that there isn’t much support at my company for InfoSec in general let alone any specific requirements and I’ve been trying to find alternative ways of getting educating people.  It looks like some of it has struck home.The HR bod in charge of the company’s weekly newsletter has asked me to write a piece </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/5938905177266623386/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/5938905177266623386" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/5938905177266623386" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/5938905177266623386" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/maybe-some-progress-at-last.html" rel="alternate" title="Maybe some progress at last....." type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-7962554412039435239</id><published>2007-05-25T12:55:00.000+01:00</published><updated>2007-05-25T12:58:52.436+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PCI Answers"/><title type="text">My head's above the parapet now!!</title><summary type="text">I’ve been invited to contribute to the PCI Answers postings on their site which is quite an ego boost.  The only thing is, this means I’m going to have to think of decent things to say!!!!Oh well, bang goes the instantaneous ramblings approach to writing comments.  I guess I had better engage that part of my brain that rarely sees daylight and actually consider what I’m writing beforehand.Oh, and</summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/7962554412039435239/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/7962554412039435239" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/7962554412039435239" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/7962554412039435239" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/my-heads-above-parapet-now.html" rel="alternate" title="My head's above the parapet now!!" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-2586291490030290846</id><published>2007-05-24T09:38:00.000+01:00</published><updated>2007-05-24T09:49:38.068+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="Taking responsibility"/><category scheme="http://www.blogger.com/atom/ns#" term="tjx"/><title type="text">The "maintaining compliance" issue</title><summary type="text">There’s an interesting discussion over on  PCI Compliance Demystified  about maintaining compliance after you have initially achieved the “tick in the box”.  The discussion is primarily about PCI DSS compliance but could be had about any compliance requirement.To paraphrase, the question was raised: “how is compliance maintained?” which has developed into a “what’s being done about maintaining </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/2586291490030290846/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/2586291490030290846" rel="replies" title="5 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/2586291490030290846" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/2586291490030290846" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/maintaining-compliance-issue.html" rel="alternate" title="The &quot;maintaining compliance&quot; issue" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-1623716284281665539</id><published>2007-05-16T10:10:00.000+01:00</published><updated>2007-05-16T10:15:40.779+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business"/><title type="text">The difference between business people and InfoSec people</title><summary type="text">OK, so TJX’s Q1 results apparently show “no noticeable decline in customer numbers” since the data breach.  In   this article  an analyst from Avondale Partners is quoted as saying:-"It still looks like there has been no meaningful fallout from the data systems breach as it relates to customer traffic," said Patrick McKeever, an analyst with Avondale Partners. "They did pretty well, all things </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/1623716284281665539/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/1623716284281665539" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/1623716284281665539" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/1623716284281665539" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/difference-between-business-people-and.html" rel="alternate" title="The difference between business people and InfoSec people" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-332862925645635949</id><published>2007-05-10T15:39:00.000+01:00</published><updated>2007-05-16T13:50:16.574+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Data Classification"/><category scheme="http://www.blogger.com/atom/ns#" term="Data ownership"/><category scheme="http://www.blogger.com/atom/ns#" term="Taking responsibility"/><title type="text">Data ownership</title><summary type="text">I read Rob Newby's post about "data classification" with interest as the implementation of such a process has been on my "to do" list for a while. To paraphase my comment to him, "I think Data Classification is one of the fundamental first steps in a good InfoSec programme". The point is, until you know how important the data is, how long it needs protecting for and who should have access to it </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/332862925645635949/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/332862925645635949" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/332862925645635949" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/332862925645635949" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/data-ownership.html" rel="alternate" title="Data ownership" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-4174377142724792934</id><published>2007-05-08T11:04:00.000+01:00</published><updated>2007-05-08T11:12:54.456+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="moving forward"/><category scheme="http://www.blogger.com/atom/ns#" term="tjx"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type="text">Why, oh why, oh wireless…..</title><summary type="text">OK, so enough of bleating about how bad things are, on to some more topical issues.This news item on Security Focus amused me.  Basically, if true, it appears that a wireless network secured with WEP only encryption was the access channel for the TJX hackers.The thing is, I have had a discussion with people here about wireless and the levels of protection used and suffice to say, I think they </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/4174377142724792934/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/4174377142724792934" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/4174377142724792934" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/4174377142724792934" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/why-oh-why-oh-wireless.html" rel="alternate" title="Why, oh why, oh wireless….." type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-8917900659410577741</id><published>2007-05-08T07:04:00.000+01:00</published><updated>2007-05-08T11:14:37.630+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Getting started"/><title type="text">I lied!!</title><summary type="text">OK, the previous post said that it was the last (for now) in the “Things I’ve done wrong” series. It wasn’t, this one is.There are other things I have learned but those are a good starter for 10. For now, I think it is safe to say that having learned the lessons I'm better equipped to start making the sort of progress I want and the company needs.From the above experiences, I looked for a </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/8917900659410577741/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/8917900659410577741" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/8917900659410577741" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/8917900659410577741" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/i-lied.html" rel="alternate" title="I lied!!" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-2787970507364983675</id><published>2007-05-08T06:32:00.000+01:00</published><updated>2007-05-08T11:10:54.597+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Getting started"/><title type="text">It’s a good idea, trust me, I’m a gynaecologist</title><summary type="text">Last (currently) in the “Things I’ve done wrong” process.To a certain extent, this is linked to expecting people to understand “why”. In the past, I have explained the details of an Info Sec related issue and then the possible remedial actions available to the company and then assumed that the correct decision would be made.   How naïve can you be?!?!?!Unfortunately, it would appear that the "</summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/2787970507364983675/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/2787970507364983675" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/2787970507364983675" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/2787970507364983675" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/its-good-idea-trust-me-im-gynaecologist.html" rel="alternate" title="It’s a good idea, trust me, I’m a gynaecologist" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-8430609148644585619</id><published>2007-05-07T12:18:00.000+01:00</published><updated>2007-05-08T11:10:29.045+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="follow up"/><category scheme="http://www.blogger.com/atom/ns#" term="Getting started"/><title type="text">No follow up</title><summary type="text">Continuing "Things I've done wrong".After designing and agreeing an Info Sec Management approach with the board another element of “Getting Distracted” happened and I never went back and followed it up. I could bleat about how “it wasn’t my fault because…” or “I meant to but this or that stopped me” but basically I should have persevered but didn’t. I allowed myself to get involved in other stuff</summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/8430609148644585619/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/8430609148644585619" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/8430609148644585619" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/8430609148644585619" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/no-follow-up.html" rel="alternate" title="No follow up" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-8548708739407946039</id><published>2007-05-05T16:22:00.000+01:00</published><updated>2007-05-05T16:31:41.268+01:00</updated><title type="text">What am I doing here?</title><summary type="text">More on the “Things I’ve done wrong”Within the first week after being given the job, I sent a draft job description to my boss (the Group FD) and scheduled a meeting to discuss. Then, an element of “distraction” came along and we never had the meeting. Due to numerous “distraction” issues thereafter, it just got sidelined.This has led to little to no authority within the company to actually get </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/8548708739407946039/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/8548708739407946039" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/8548708739407946039" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/8548708739407946039" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/what-am-i-doing-here.html" rel="alternate" title="What am I doing here?" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-1287497378920499840</id><published>2007-05-04T21:48:00.000+01:00</published><updated>2007-05-04T21:53:08.093+01:00</updated><title type="text">Don't just take my word for it</title><summary type="text">Continuing the "Things I've done wrong" seriesThe next error I made was expecting people to understand why something is either a good idea or necessary.  An extreme example follows:-Imagine a discussion where you have to explain in finite detail "why" a company should implement a firewall solution at all. I don't mean a certain type of firewall, I mean any firewall.Things aren't quite that bad </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/1287497378920499840/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/1287497378920499840" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/1287497378920499840" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/1287497378920499840" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/dont-just-take-my-word-for-it.html" rel="alternate" title="Don't just take my word for it" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-2752488126483282299</id><published>2007-05-04T08:05:00.000+01:00</published><updated>2007-05-08T11:10:09.291+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="distraction"/><category scheme="http://www.blogger.com/atom/ns#" term="Getting started"/><title type="text">Getting distracted is a killer</title><summary type="text">First part of the "things I've done wrong" theme is "Getting distracted".This is the main reason for lack of progress. The Company I work for is primarily an online entertainment provider (no, not that sort of “entertainment”!!) and focuses heavily on new initiatives and new markets. This means a lot of "drop that, do this" type meetings. Not conducive to long term planning, unfortunately.The </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/2752488126483282299/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/2752488126483282299" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/2752488126483282299" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/2752488126483282299" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/first-part-of-things-ive-done-wrong.html" rel="alternate" title="Getting distracted is a killer" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-2774510607347439417</id><published>2007-05-03T14:54:00.000+01:00</published><updated>2007-05-03T16:09:35.020+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Getting started"/><title type="text">Things I've done wrong</title><summary type="text">Right then, first real post. I thought I'd start off by listing out the things I'd done wrong since persuading the company to generate the position of Information Security Manager and giving me the job. That all happened about 6 months ago and to be honest, I don't feel like I've made a lot of progress since. So, first is a list of titles in no particular order, I'll comment against each over the</summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/2774510607347439417/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/2774510607347439417" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/2774510607347439417" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/2774510607347439417" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/things-ive-done-wrong.html" rel="alternate" title="Things I've done wrong" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-783068595654475782.post-8380064348407268092</id><published>2007-05-03T13:15:00.000+01:00</published><updated>2007-05-03T13:51:42.916+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="1st Post"/><title type="text">1st Post</title><summary type="text">So, after reading and commenting on various Information Security and PCI DSS related posts and blogs over the past few months I have decided to start blogging on the subject.This is the first post and therefore not that interesting.My intention is to post my thoughts about my current situation which is setting up an Information Security Management environment and directing a PCI DSS compliance </summary><link href="http://infosecandpcifromscratch.blogspot.com/feeds/8380064348407268092/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/783068595654475782/8380064348407268092" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/8380064348407268092" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/783068595654475782/posts/default/8380064348407268092" rel="self" type="application/atom+xml"/><link href="http://infosecandpcifromscratch.blogspot.com/2007/05/1st-post.html" rel="alternate" title="1st Post" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry></feed>