Troy Leach

Opinions expressed by ICN authors are their own.

Troy Leach is the chief technology officer for the PCI Security Standards Council. In his role, Leach partners with council representatives, participating organizations and industry leaders to develop comprehensive standards and strategies to secure payment card data and the supporting infrastructure.

Leach is a congressional subject matter expert on payment security and the current chairman of the Council's Standards Committee. Prior to joining the PCI Council, Leach has held various positions in IT management, software development, systems administration, network engineering, security assessment, forensic analytics and incident response for data compromise. Leach holds a master of science in telecommunications and network management as well as a graduate degree in information security management from Syracuse University.

The opinions expressed in this blog are those of Troy Leach and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Software and the acceleration of payment security

CISOs need to keep up with the hyper pace of security

CISOs need to keep up with the hyper pace of security

Innovations are causing a seismic shift in how we consider information security, pushing the protection of consumer payments beyond the traditional role of finance and/or IT departments to design and manufacturing of everyday products...

Promoting efficiencies through security metrics

Promoting efficiencies through security metrics

Creating metrics for a security program can be a challenge for many organizations. Troy Leach, CTO of Payment Card Industry Security Standards Council, discusses best practices for creating meaningful security metrics.

10 years of PCI: Building the payment security of tomorrow by learning from our past

10 years of PCI: Building the payment security of tomorrow by learning from our past

How can we fight against fraud in the future in a much more complex ecosystem? The answer may be in the next generation of security technology and strategy.

Load More