NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
March 18, 2019

PCI Data Security Standard 4.0

Justin Fimlaid Justin Fimlaid

You’ve probably heard the rumors.  The PCI Council is prepping to release the PCI Data Security Standard 4.0.  To date the actual proposed changes have been kept private to the PCI-SSC stakeholders (so limited viewing).  The PCI-SSC stakeholders were asked to review the draft in the 2017 request for comments period.  Hopefully by the time the new standard is released it won’t be already outdated by the shifting and ever-changing cybersecurity landscape. PCI-DSS Version 4.0 is expected to be released in Q3 or Q4 of 2020.

There are a couple rumors floating around that the PCI DSS will be going after.  Those speculated topic areas are:

  1. Authentication and specifically adding enhanced multi-factor authentication requirements.
  2. More clarity about encryption on internal and trusted networks.  The thought being that data should be encrypted at all times, with a commercially reasonable cipher strength, any time and any place it’s being processed, transmitted, or stored.
  3. Enhanced monitoring requirements.  This could be an important one for most companies. The standard for logging and what should be monitored is well established, so the expectation is that the PCI-DSS will include some requirements on what should be logged, tracked, monitored.
  4. Heightened scrutiny on high value controls.  It’s looking like the PCI-DSS might actually shift away from the check-the-box approach on security controls and move more towards a risk based control model.  This shift might take place in a couple different forms but the hope is that the PCI-SSC will bridge the annual risk assessment with the annual report on compliance assessment to test high-value security controls more frequently.

The PCI-SSC has also been taking a look at the 12 core PCI-DSS requirements and trying to determine if changes should be made.  The expectation is that they will largely leave the 12 requirements in place with making minor changes to accommodate the threat landscape.

 

Included Topics

  • Compliance
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Cybersecurity Technology 8 min read
Splunk data onboarding: Success with Syslog-ng and Splunk – part 2 Read More
Cybersecurity Technology 4 min read
Splunk data onboarding: Success with Syslog-ng and Splunk - part 1 Read More
Cybersecurity Technology 6 min read
Splunk data onboarding: Success with Syslog-ng and Splunk – part 3 troubleshooting Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.