Florian Yanez, manager of technical systems for Helzberg Diamonds, explains how tokenization helped the company solve data storage and PCI DSS challenges. SAN FRANCISCO — Florian Yanez, manager of technical systems for Helzberg Diamonds, is among those attending RSA Conference 2011. CSO recently caught up with him for a discussion on his company’s efforts to adopt tokens as a way to address PCI DSS’ rules on stored customer data.CSO: Let’s start with a general picture of your organization’s main security priorities. PCI DSS requirement — particularly the parts about protecting stored data such as credit card and telephone numbers.Yanez: Like everyone else, our biggest concern is protecting customer information and meeting theCSO: What are some of the basics in terms of the technology you’ve deployed to address that? Yanez: We have a security event management system in place to capture all the logs in our data center. We get alerts if anything strange shows up. We also have a vulnerability management system in the works so we can scan for all the security patches we need on a regularly basis. We want to be as up to date on patching as possible.Also see: “Vulnerability management keeps getting sexier” You’ve also been in the process of implementing tokenization. What led to that focus?Yanez: For a little over a year we’ve been taking this route because tokenizing our data turned out to be the best way to address the concerns of PCI. We were originally looking for an encryption tool. We went with nuBridges as a vendor because they have an adapter tool for key management between us and our point-of-sale (POS) vendor.Several years ago our POS vendor started adding encryption to their system. They built a key management utility with all the encryption and decryption functionality. But we realized encryption was also needed in all the back-end systems as well. To make it easier, we thought it best to use the same key for the POS vendor and back-end systems. Our POS vendor was already using nuBridge, so it made sense for us.CSO: How far along are you in the project?Yanez: We are not fully implemented yet. We’re almost there. But when we’re done we’ll be in a much better position in terms of PCI. This will make the PCI scope much more manageable.CSO: How so? Yanez: We’ll have less than 10 systems that we’ll have to worry about under PCI DSS at the corporate office, which is a huge reduction. Before we started tokenization, we had to worry about 400 systems in the corporate office.CSO: What have your implementation challenges been thus far?Yanez: Making the decision between tokenization and encryption was hard. At first encryption seemed like the best, most obvious approach. But the deeper we dug into it, the more we decided we needed to go the other way. Encrypted data is PCI data and is therefore under the PCI scope. Tokens are not PCI data, so all systems we put tokens on are not in scope. It made network segmentation a lot easier.CSO: Any configuration problems? Yanez: Yes. We are primarily a Windows shop, so when we developed in-house software to support this, it wasn’t a perfect match with the nuBridge software. But we’ve been able to work through it. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe