Fraud Management & Cybercrime , Global Compliance , Governance & Risk Management

Multilayered Security Gets Personal

First Data's Tim Horton on Why Encryption Is Not Enough to Secure PII
Tim Horton, vice president, global merchant security and compliance solutions, First Data

When large-scale data breaches started to proliferate more than a decade ago, security leaders called for end-to-end data encryption. But that approach no longer suffices, says First Data's Tim Horton, who calls for a new multilayered defense.

For years now, Horton says, many enterprises have focused on protecting payment card data. "But if you look most recently at the data breaches that have been occurring, as much PII has been stolen as [card data], and that data has now become five times more valuable on the dark web," he says.

In a video interview at Information Security Media Group's rcent Fraud and Breach Summit in Chicago, Horton discusses:

  • The need to pay more heed to data security;
  • Why a multilayered approach protects businesses as well as their customers;
  • Why end-to-end encryption is no longer sufficient.

Horton is vice president of global security and compliance solutions at First Data. He is responsible for managing First Data's cybersecurity and compliance development initiatives for small and midsize businesses as well as national merchants to equip them with the right tools to protect their sensitive data and maintain PCI DSS compliance. In addition, Horton represents First Data on the PCI DSS Board of Advisers.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.