CLOSING THE GAP IN TOKENIZATION: REMOVING THE LAST VULNERABILITY

Size: px
Start display at page:

Download "CLOSING THE GAP IN TOKENIZATION: REMOVING THE LAST VULNERABILITY"

Transcription

1 CLOSING THE GAP IN TOKENIZATION: REMOVING THE LAST VULNERABILITY 1 May 2013

2 Table of Contents Introduction 3 Tokenization: A Cost-Effective Way to Reduce Exposure 4 Why Invest in Tokenization?...6 Selecting a Tokenization Vendor..6 Regulatory Compliance 6 Transparency 7 Maintenance 7 Ease of Implementation 7 Scalability 7 Auditability 8 Key Features to Look for in Selecting a Tokenization Solution 8 Stateless Tokenization 8 Data Integrity 8 Randomly Generated Tokens 8 Support for Fine-Grained Permissions 9 Token Multiplexing 9 Summary 9 About Voltage Secure Stateless Tokenization..10 About Mercator Advisory Group

3 Introduction When the card networks adopted the Payment Card Industry Data Security Standards (PCI DSS), they effectively raised the bar on how sensitive data should be protected. Their objectives had consequences for any company that accepts network-branded cards for payment. Companies that accept payment cards were suddenly required to comply with data security requirements at levels that were previously the exclusive domain of companies specializing in financial services such as banks and securities firms. Many were not prepared. Controversy shrouded the launch of the PCI DSS standards, as merchants balked at the complexity and cost of compliance. This raised public awareness of the importance of payment card security. With the market increasingly moving toward a card-not-present environment of online shopping and e-commerce, companies that processed large volumes of payment transactions quickly became targets for criminals aiming to commit fraud and identity theft. The market responded to the security standards by rushing to either end of the compliance continuum. On one end were companies that viewed the processing of payments as not strategic or core to their business. These firms quickly outsourced the entire payment process. Their approach to compliance was avoidance. By externalizing the payment, a company could avoid coming in contact with the card number and thus be exempt from the scope of PCI compliance. On the other end of the continuum, companies embraced the standard. For many, the focus was on the foundational elements of the standard securing the card number while it was in transit and at rest. Through encryption (e.g., using the Secure Sockets Layer, or SSL, protocol) and by exploiting the loopholes of compensating controls, the IT departments of many organizations convinced their management that these baseline requirements were relatively easy to meet. As the standards evolved and new approaches emerged in the market, such primitive approaches were increasingly viewed as risky. However, as the card schemes increased their emphasis on monitoring compliance and Qualified Security Assessors (QSAs) performed their assessments, companies came to understand the full implications and complexity of PCI compliance. Every system that came in contact with the card number fell within its scope. Programmers who had access to any of these systems had to be authenticated with two factors, and their system activities came under increased scrutiny with Open Web Application Security Project (OWASP) scans and continual testing for penetration of the secure perimeter. Complicating matters further, the standards continue to evolve and the general requirements are subject to interpretation by the QSA. Actions deemed compliant by one auditor may be considered insufficient by another auditor. And to make matters worse, companies that had remediated their systems and received a QSA s Report on Compliance (ROC) have still been breached, with not only the loss of sensitive data resulting that PCI was supposed to prevent but also the negative publicity and significant costs. 3

4 Companies increasingly saw the overall cost of compliance skyrocketing while the corresponding reputational and financial risk did not seem to diminish. PCI compliance did not necessarily mean the company was impervious to breach; an ROC simply documents that at the point in time when the assessment was prepared, the communicated standards and procedures met the requirements as set forth by PCI. Data security requires both vigilance and an expense proportional to the size and the number of systems with access to card data. The greater the number of systems involved, the more that hardware and software needs to be monitored, the more programmers and their programs need to be reviewed, and the more users have access to the data. As PCI continues to evolve, changes in the standards must be applied across all of the involved systems, further increasing costs and complexity. Tokenization: A Cost-Effective Way to Reduce Exposure As companies wrestle with the cost and complexity of compliance with PCI standards, tokenization emerged as a viable alternative to the secure the universe approach. In tokenization, the sensitive information (card number) is removed from all of the systems and is replaced by a number (a surrogate value) that has no value to external parties (thieves). The security of this number, called a token, is preserved since it cannot be reverse engineered to ascertain the original number. Tokenization converts credit card numbers into randomly generated values. At the front end, when a card number is captured at the point of sale or through an e-commerce website, it is securely transmitted (encrypted) to the tokenization engine, which immediately converts the sensitive data into a token that is returned to the requesting application. The token is maintained within the various applications, and when it needs to be presented to the acquirer or card schemes, it is detokenized and replaced with the card number and securely presented to the destination. The challenge of tokenization is to properly secure the environment (called the trusted zone) where the card number is tokenized and detokenized as well as the storage area where the cross-reference is typically maintained. Internally, the card number is typically retained for use only in customer service (e.g., to resolve disputes and for charge-backs) or to reverse or repeat a previous payment. A token enables both of these functions without having to involve the system within the scope of a PCI assessment. Some organizations also use the card number as a means to identify the customer and his or her bank, analyzing the card number to produce loyalty or sales analysis. While frowned upon by the card industry, with a properly structured token such activity can be performed without the risk of divulging sensitive payment information. In order for most companies to cost effectively implement a tokenization solution, the token has to resemble many of the characteristics of an actual card. Often systems have internal functions that look for valid lead numbers (or BINs, Bank Identification Numbers) that correspond to the card scheme (4 for Visa, 5 for MasterCard, etc.), have 4

5 the appropriate number of digits for the card (13 19 characters), or even a mod-10 (modulus-10, or LUHN formula) check digit. Tokenization addressed these challenges with format-preserving approaches in which the token replicated the characteristics of a card. In a format-preserving token, certain characteristics of the original card are maintained (e.g., last four digits of the card number) and/or some representation of the type of card and issuer. As best practices have evolved, the industry has driven toward a standard of distinguishability, whereby the characteristics of the token make it is clear that it is not an actual card number. Removing the card number from all enterprise systems significantly reduces the scope of a merchant s PCI compliance requirement and minimizes the merchant s exposure to crimes of convenience and social engineering. Tokenization itself is rather simple, typically consisting of less than a dozen programs/services that convert a card number into a token and vice versa. This serves to further reduce the complexity of compliance monitoring because the number of programmers required to maintain the application is minimal, the in-scope hardware is nominal, and the administrators ability to audit system access is significantly enhanced. However, maintaining a secure processing environment that can scale and remain impervious to compromise continues to present challenges for even the most sophisticated IT departments. One approach to tokenization is to outsource the process. However, in the long run, this can be an expensive proposition as many vendors apply a per-access charge every time the data vault is accessed. Outsourcers also tend to be inflexible and restrictive regarding the way the service is configured, as having a standardized offering drives economies of scale and margin. Additionally, some are aligned with specific acquirers, potentially requiring new relationships, despite the fact that proprietary approaches often pose difficulties when changing providers. In-house solutions provide merchants and enterprises with better control and typically a more cost-effective solution. Most solutions, however, require maintenance of the cross-reference database that holds the card data. A token database requires regular rotation of the security keys, which has implications with disaster recovery or business continuity back-ups, database release management/upgrades, audit log management, dual controls, and more. Addressing these challenges distracts scarce resources from mission-critical business issues. Even after removing the card number from the various enterprise systems and restricting the presence of credit card information to a well-protected database, companies are exposed to database administrators and superusers or system administrators that can gain access to the sensitive data and could potentially transfer a vault s content to personal storage devices. The beauty of tokenization is that it reduces the number of systems and users that have access to the actual card data, which improves control. The downside is that it concentrates the sensitive information into a small footprint that becomes the target of criminals. The optimal solution is to further neutralize the attractiveness of that tokenization database by eliminating the sensitive data. 5

6 Why Invest in Tokenization? Firms must consider many factors when deciding whether to implement tokenization in-house with a premisesbased solution or to outsource it to a service provider. Any consumer-facing company that also has personally identifiable information (PII) entered on Web forms by customers as well as credit card numbers should lean toward managing a PCI tokenization solution in-house. Many of the standards and best practice guidelines that have been applied to payment card data will ultimately apply to the management and use of PII. Having a solid data security practice and a mechanism to store sensitive data will enhance a company's ability to safely expand its operations, particularly as cloud-based models and big data analytics increasingly require data to be shared. Tokenization provides a number of benefits, the primary one being the reduction of applications and hardware that handle sensitive data. By limiting the presence of card numbers to a small number of servers and programs, significantly fewer applications, devices, and people fall within the scope of the compliance assessment. This simplifies the assessment and reduces costs and the need for encryption software licenses, two-factor authentication tokens, software change management, and transaction monitoring activities. Ongoing maintenance of a tokenization environment is also reduced. Typically a tokenization environment consists of a limited number of programs and transactions that reduce the number of programmers required to have access to the actual card number data. With a small number of predictable transactions, ongoing monitoring of the environment for suspicious activity can be enhanced and aberrations readily identified for action. The result is a more secure and auditable environment. Selecting a Tokenization Vendor Once a decision is made to implement an on-premise tokenization solution, there are a number of factors to be considered. Regulatory Compliance Many solutions on the market claim to be PCI compliant, but in reality compliance requirements extend well beyond individual hardware or software components. PCI compliance involves ongoing monitoring of activity, penetration testing, reviews of code change, control over system and software access, and more. The ability to minimize the scope of these ancillary processes should be a primary consideration, as it will reduce the overall cost of compliance. An assessment is not a science, and PCI leaves a lot to the discretion of a Qualified Security Assessor, or QSA. It is important to obtain a solution from a vendor who has a proven track record of helping clients obtain Reports on Compliance (ROCs) and satisfying the QSA s remediation requirements. These vendors typically have invested in their products and have created innovative solutions to consistently address the challenges of PCI compliance and tokenization. 6

7 Transparency Transparency is key. Vendors need to be able to provide proof of their data protection claims and be able to explain their methods in detail to customers and their QSAs. But the real proof is through independent verification, in which the vendor s solution has been put to the test by multiple QSAs, clients have received their ROCs, and the vendor s customers continually stand the test of time without compromised security. Maintenance Solutions that are specific to hardware platforms, operating systems, or other supporting software become dependent upon those environments for their compliance. As these platforms and systems change, typically the software that runs on them has to be changed as well. Solutions that are agnostic to platform and operating system provide considerable advantage over those that are linked to specific environments and those environments vulnerabilities. Part of maintenance is key management, the rotation of master keys, which is paramount to a solid security practice. In a typical tokenization environment, synchronizing the new key with previously issued tokens may be problematic. Look for a solution that recognizes the importance of key management and provides tools that simplify the process. Ease of Implementation Implementing a tokenization solution requires that the conversion from card number to token and back be placed in-stream with mission-critical operations. Often there are multiple sources and destinations for payment card data. The solution needs to fit seamlessly within the existing operations instead of necessitating that the operations be revamped to accommodate the software solution. A tokenization solution should have minimal impact on the overall operations. The solution should provide a variety of options for configuration of the token (format-preserving formats). It should minimize the remediation of existing systems while providing back-office and customer service personnel with the information they need to perform their tasks (e.g., BIN or last four digits of the card number). Scalability Once a tokenization solution has been selected, it should require minimal monitoring to ensure it can support the growth of the business. Resource consumption for tokenization should be minimal and predictable so that it doesn t require much attention as the data center continues to expand and platforms need to be upgraded. Memory-based processing is much faster and has higher availability than does database access, which is vulnerable to channel and database synchronization bottlenecks as well as hardware failure. 7

8 Auditability One of the advantages of tokenization is that it concentrates the sensitive data in a single location with a very small universe of permitted activities. This facilitates a high level of scrutiny about the activity that takes place. The tokenization solution should be able to provide extensive detail about any activity where the card number is being accessed, either by an application or by a user. Key Features to Look for in Selecting a Tokenization Solution Features that can help your business overcome the challenges of traditional tokenization solutions include the following. Stateless Tokenization Token databases, also known as token vaults, are always in scope for PCI compliance because they contain the actual card data. Traditional tokenization solutions are vulnerable because they maintain the cross-reference between the token and the encrypted card number within a database table. Stateless tokenization removes the storage of card data from any system, eliminating the need for token databases. In addition to eliminating the exposure to file theft, a stateless token is typically agnostic to the platform and operating system, which reduces both implementation cost and complexity. Note, however, that not all stateless tokenization solutions are provably secure. Look for independent, published third-party validation and security proofs substantiating a vendor s solution. Data Integrity Traditional tokenization solutions cannot guarantee consistent 1-to-1 mapping of credit card number to token. Enterprises and merchants that have implemented first-generation tokenization approaches, whether commercial solutions or homegrown, have encountered critical data integrity problems with inaccurate analytics and other application correlation due to credit card numbers sometimes being replaced by more than one token (a side effect of having a distributed token database). Randomly Generated Tokens Creating tokens from a pregenerated token table removes the need for a token database and eliminates the exposure of the token to being reverse engineered (since no feasible reversibility relationship exists between the primary account number, or PAN, and the resulting token). This method also improves security by removing the storage of cardholder data and improves overall throughput. Pregenerated token tables can be utilized in distributed architectures, each installation prepopulated with the same look-up table, which can easily scale to support regional and global growth efforts. Since token generation is performed in memory, there is no need for specialized hardware or software (which typically require expensive licenses), further driving down total cost of ownership. 8

9 Support for Fine-Grained Permissions One of the primary advantages of tokenization is that a reduced footprint provides much greater control over who has access to the card information. Fine-grained permissions enable companies to lock down access to sensitive data without impeding business processes. The access of individual applications or users can be limited to tokenized or detokenized data only, or to detokenized data but with certain digits masked. Fine-grained permissions are typically accompanied with detailed audit logs that provide indisputable evidence of who had access to which card. Token Multiplexing Multiplexing is a means to avoid high-value tokens by enabling token independence or unique token mappings between merchants, applications, and lines of business. A high-value token is a token that takes on the characteristics of the card number it replaces, so that the token can be used to initiate a payment transaction within the organization. In such instances, the token falls under the same PCI scrutiny as the actual card. Token multiplexing restricts the use of the token without the cost and complexity of multiple databases. Summary PCI DSS set the standard on how sensitive data must be protected. For any enterprise that is engaged in consumerfacing commerce, establishing capabilities for secure transactions is strategic and core to the business. Minimizing the footprint where sensitive data is stored reduces the complexity, cost, and ultimately the exposure associated with protecting sensitive data. Removing sensitive data from core business applications and replacing it with a token (that is, the process of tokenization) is increasingly being recognized as the industry best practice for securing sensitive data. Although it reduces the presence of the card number, tokenization does not remove the card s associated sensitive data from the enterprise, and heightened security procedures need to be implemented to protect the physical storage of the card numbers. The industry trend toward so-called stateless tokenization, whereby the processing is done in memory instead of through database look-ups, minimizes this storage exposure while enhancing the throughput and scalability of a tokenization solution. 9

10 About Voltage Secure Stateless Tokenization The features described in this report are available are part of the new Voltage Secure Stateless Tokenization (SST) solution from Voltage Security. Voltage SST has been designed by cryptographic experts, is based on published and proven academic research, and is validated by third-party QSAs and cryptography experts. It provides maximum protection against data exposure from security breaches while offering a proven technique for PCI DSS compliance and maximum PCI audit scope reduction. Contact Voltage at for a follow up. Voltage Security, Inc. is the leading provider of scalable and proven data-centric security and key management solutions, enabling customers to effectively combat new and emerging security threats. Powered by groundbreaking innovations including Identity-Based Encryption, Format-Preserving Encryption, Page-Integrated Encryption, and Secure Stateless Tokenization, our powerful data protection solutions allow any company to seamlessly secure all types of sensitive corporate and customer information, wherever it resides, while efficiently meeting regulatory compliance and privacy requirements. For more information, visit

11 About Mercator Advisory Group Mercator Advisory Group is the leading, independent research and advisory services firm exclusively focused on the payments and banking industries. We deliver a unique blend of services designed to help clients uncover the most lucrative opportunities to maximize revenue growth and contain costs. Advisory Services Services providing unparalleled, independent, and objective analysis and include Banking Channels, Credit, Commercial and Enterprise Payments, Debit, Emerging Technologies, Fraud, Risk and Analytics, International, and Prepaid. The CustomerMonitor Survey Series A set of topically grouped reports gleaned from a unique set of specific, pragmatic and detailed questions and updated yearly to capture critical topic content. Custom Research and Consulting Services Services enabling clients to gain actionable insights, implement more effective strategies, and accelerate go-to-market plans. Offerings include tailored project-based expertise, customized primary research, go-to-market collateral, market sizing, competitive intelligence, and payments industry training. PaymentsJournal.com The industry s only free online payments and banking news information portal delivering focused content, expert insights and timely news. For information, contact Mercator Advisory Group at Copyright Notice External publication terms for Mercator Advisory Group information and data: Any Mercator Advisory Group information that is to be used in advertising, press releases, or promotional materials requires prior written approval from the appropriate Mercator Advisory Group research director. A draft of the proposed document should accompany any such request. Mercator Advisory Group reserves the right to deny approval of external usage for any reason. Copyright 2013, Mercator Advisory Group, Inc. Reproduction without written permission is completely forbidden. 11

Voltage Secure Commerce

Voltage Secure Commerce SOLUTION BRIEF Voltage Secure Commerce PROTECT SENSITIVE DATA FROM BROWSER TO BACK-OFFICE Safely Enable Mobile and E-commerce Channels while Simplifying PCI Compliance If your business runs credit card

More information

Voltage Secure Stateless Tokenization

Voltage Secure Stateless Tokenization WHITE PAPER Voltage Secure Stateless Tokenization DATA PROTECTION AND PCI SCOPE REDUCTION FOR TODAY S BUSINESSES Introduction Cyber criminals have proved adept at thwarting existing IT defenses and exploiting

More information

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

CyberSource Payment Security. with PCI DSS Tokenization Guidelines CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance

More information

The Relationship Between PCI, Encryption and Tokenization: What you need to know

The Relationship Between PCI, Encryption and Tokenization: What you need to know October 2014 The Relationship Between PCI, Encryption and Tokenization: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems,

More information

A RE T HE U.S. CHIP RULES ENOUGH?

A RE T HE U.S. CHIP RULES ENOUGH? August 2015 A RE T HE U.S. CHIP RULES ENOUGH? A longer term view of security and the payments landscape is needed. Abstract: The United States is finally modernizing its card payment systems and confronting

More information

How To Protect Visa Account Information

How To Protect Visa Account Information Account Information Security Merchant Guide At Visa, protecting our cardholders is at the core of everything we do. One of the many reasons people trust our brand is that we make buying and selling safer

More information

What Data Thieves Don t Want You to Know: The Facts About Encryption and Tokenization

What Data Thieves Don t Want You to Know: The Facts About Encryption and Tokenization What Data Thieves Don t Want You to Know: The Facts About Encryption and Tokenization 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material are the property

More information

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance March 29, 2012 1:00 p.m. ET If you experience any technical difficulties, please contact 888.228.0988 or support@learnlive.com

More information

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material

More information

PCI Compliance Overview

PCI Compliance Overview PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)

More information

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance Payment Security White Paper Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance Breaches happen across all industries as thieves look for vulnerabilities.

More information

INFORMATION TECHNOLOGY FLASH REPORT

INFORMATION TECHNOLOGY FLASH REPORT INFORMATION TECHNOLOGY FLASH REPORT Understanding PCI DSS Version 3.0 Key Changes and New Requirements November 8, 2013 On November 7, 2013, the PCI Security Standards Council (PCI SSC) announced the release

More information

An article on PCI Compliance for the Not-For-Profit Sector

An article on PCI Compliance for the Not-For-Profit Sector Level 8, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 An article on PCI Compliance for the Not-For-Profit Sector Page No.1 PCI Compliance for the Not-For-Profit Sector

More information

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:

More information

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review Prepared for: Coalfire Systems, Inc. March 2, 2012 Table of Contents EXECUTIVE SUMMARY... 3 DETAILED PROJECT OVERVIEW...

More information

Payment Card Industry Data Security Standards

Payment Card Industry Data Security Standards Payment Card Industry Data Security Standards Discussion Objectives Agenda Introduction PCI Overview and History The Protiviti Difference Questions and Discussion 2 2014 Protiviti Inc. CONFIDENTIAL: This

More information

Becoming PCI Compliant

Becoming PCI Compliant Becoming PCI Compliant Jason Brown - brownj52@michigan.gov Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History

More information

Achieving PCI DSS Compliance Through Outsourcing: Where to begin?

Achieving PCI DSS Compliance Through Outsourcing: Where to begin? Achieving PCI DSS Compliance Through Outsourcing: Where to begin? August 2014 Can you achieve PCI DSS compliance through outsourcing, and if so, how should you approach it? This whitepaper provides a brief

More information

ANALYTICS: SHAPING THE RIGHT CUSTOMER EXPERIENCE

ANALYTICS: SHAPING THE RIGHT CUSTOMER EXPERIENCE EMV Technology: Deploying Soon in the U.S. ANALYTICS: SHAPING THE RIGHT CUSTOMER EXPERIENCE 2010 Mercator Advisory Group, Inc. Clock Tower Place, Suite 420 Maynard, MA 01754 phone: 1(781) 419-1700 e-mail:

More information

PREPAID CARDS IN THE SMARTPHONE AGE: MOBILE STRATEGIES FOR CUSTOMER ENGAGEMENT

PREPAID CARDS IN THE SMARTPHONE AGE: MOBILE STRATEGIES FOR CUSTOMER ENGAGEMENT PREPAID CARDS IN THE SMARTPHONE AGE: MOBILE STRATEGIES FOR CUSTOMER ENGAGEMENT 2010 Mercator Advisory Group, Inc. Clock Tower Place, Suite 420 Maynard, MA 01754 phone: 1(781) 419-1700 e-mail: info@mercatoradvisorygroup.com

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility

More information

Understanding the Value of Tokens

Understanding the Value of Tokens Understanding the Value of Tokens 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material are the property of their respective owners. Introduction Credit

More information

Achieving Compliance with the PCI Data Security Standard

Achieving Compliance with the PCI Data Security Standard Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),

More information

Whitepaper. Simplifying the Payment Card Industry Data Security Standard. Abstract. A Security-Assessment.com Publication. Special points of interest:

Whitepaper. Simplifying the Payment Card Industry Data Security Standard. Abstract. A Security-Assessment.com Publication. Special points of interest: Whitepaper Simplifying the Payment Card Industry Data Security Standard A Security-Assessment.com Publication Special points of interest: Visa research found that...theft or loss of per sonal fi nanci

More information

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0 Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0 September 2011 Changes Date September 2011 Version Description 1.0 To introduce PCI DSS ROC Reporting Instructions

More information

Outsourcing Payment Security. How outsourcing security technology is changing the face of epayment acceptance practices

Outsourcing Payment Security. How outsourcing security technology is changing the face of epayment acceptance practices Outsourcing Payment Security How outsourcing security technology is changing the face of epayment acceptance practices Paymetric White Paper Outsourcing Payment Security 2 able of Contents The Issue: Payments

More information

PCI Compliance: How to ensure customer cardholder data is handled with care

PCI Compliance: How to ensure customer cardholder data is handled with care PCI Compliance: How to ensure customer cardholder data is handled with care Choosing a safe payment process for your business Contents Contents 2 Executive Summary 3 PCI compliance and accreditation 4

More information

2016 OUTLOOK: GLOBAL PAYMENTS

2016 OUTLOOK: GLOBAL PAYMENTS December 2015 2016 OUTLOOK: GLOBAL PAYMENTS Disruption across the industry a global theme Around the world, new entrants (including start-ups and nontraditional players) are entering the payments industry.

More information

PCI Compliance. Top 10 Questions & Answers

PCI Compliance. Top 10 Questions & Answers PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

PCI DSS Compliance. 2015 Information Pack for Merchants

PCI DSS Compliance. 2015 Information Pack for Merchants PCI DSS Compliance 2015 Information Pack for Merchants This pack contains general information regarding PCI DSS compliance and does not take into account your business' particular requirements. ANZ recommends

More information

Conquering PCI DSS Compliance

Conquering PCI DSS Compliance Any organization that stores, processes or transmits information related to credit and debit card payments has a responsibility to protect each cardholder s personal data. To help accomplish this goal,

More information

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to:

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to: What is the PCI standards council? The Payment Card Industry Standards Council is an institution set-up by American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International

More information

End-to-end Encryption for E-Commerce Payments using Voltage SecureData Web

End-to-end Encryption for E-Commerce Payments using Voltage SecureData Web Technical Brief using Voltage SecureData Web Introduction Today, merchants accepting card-not-present payments on the web are concerned about three major issues affecting their business with respect to

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

OVERVIEW. With just 10,000 customers in your database, the cost of a data breach averages more than $2 million.

OVERVIEW. With just 10,000 customers in your database, the cost of a data breach averages more than $2 million. Security PLAYBOOK OVERVIEW Today, security threats to retail organizations leave little margin for error. Retailers face increasingly complex security challenges persistent threats that can undermine the

More information

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

What You Need to Know About PCI SSC. 2014 Guiding open standards for global payment card security

What You Need to Know About PCI SSC. 2014 Guiding open standards for global payment card security What You Need to Know About PCI SSC 2014 About the PCI Council Founded in 2006 - Guiding open standards for payment card security Development Management Education Awareness Expanding Global Representation

More information

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Introduction In today s dynamic business environment, corporation s intangible

More information

Foregenix Incident Response Handbook. A comprehensive guide of what to do in the unfortunate event of a compromise

Foregenix Incident Response Handbook. A comprehensive guide of what to do in the unfortunate event of a compromise Foregenix Incident Response Handbook A comprehensive guide of what to do in the unfortunate event of a compromise Breadth of Expertise - You re in safe hands Foregenix is a global Information Security

More information

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011) Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions Version 5.0 (April 2011) Contents Contents...2 Introduction...3 What are the 12 key requirements of

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard Abhinav Goyal, B.E.(Computer Science) MBA Finance Final Trimester Welingkar Institute of Management ISACA Bangalore chapter 13 th February 2010 Credit Card

More information

Comodo HackerGuardian PCI Approved Scanning Vendor Compliancy drives commerce: A reseller's Case Study - Merchant-Accounts.ca

Comodo HackerGuardian PCI Approved Scanning Vendor Compliancy drives commerce: A reseller's Case Study - Merchant-Accounts.ca E N T E R P R I S E Enterprise Security Solutions TM Comodo HackerGuardian PCI Approved Scanning Vendor Compliancy drives commerce: A reseller's Case Study - Merchant-Accounts.ca May 2008 PCI Data Security

More information

TABLE OF CONTENTS. INTRODUCTION: - Section 1: PCI DSS Version 3.0 Changes - Section 2: Can IDS and WAF Techniques Replace Systems with PCI DSS 3.0?

TABLE OF CONTENTS. INTRODUCTION: - Section 1: PCI DSS Version 3.0 Changes - Section 2: Can IDS and WAF Techniques Replace Systems with PCI DSS 3.0? TABLE OF CONTENTS INTRODUCTION: - Section 1: PCI DSS Version 3.0 Changes - Section 2: Can IDS and WAF Techniques Replace Systems with PCI DSS 3.0? PREPARATION: - PCI DSS 3.0 Reporting and Auditing REQUIREMENTS:

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Introduction to PCI DSS Compliance. May 18, 2009 1:15 p.m. 2:15 p.m.

Introduction to PCI DSS Compliance. May 18, 2009 1:15 p.m. 2:15 p.m. Introduction to PCI DSS Compliance May 18, 2009 1:15 p.m. 2:15 p.m. Disclaimer The opinions of the contributors expressed herein do not necessarily state or reflect those of the National Association of

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

PCI Compliance Top 10 Questions and Answers

PCI Compliance Top 10 Questions and Answers Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards Westpac Merchant A guide to meeting the new Payment Card Industry Security Standards Contents Introduction 01 What is PCIDSS? 02 Why does it concern you? 02 What benefits will you receive from PCIDSS?

More information

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed

More information

How To Reduce Pci Dss Scope

How To Reduce Pci Dss Scope WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS

More information

Mainframe Data Protection in an Age of Big Data, Mobile, and Cloud Computing

Mainframe Data Protection in an Age of Big Data, Mobile, and Cloud Computing SOLUTION BRIEF Mainframe Data Protection in an Age of Big Data, Mobile, and Cloud Computing Compelling business value propositions such as improved time-to-insight, customer access, business agility, and

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

Fighting Today s Cybercrime

Fighting Today s Cybercrime SECURELY ENABLING BUSINESS Fighting Today s Cybercrime Ongoing PCI Compliance Using Data-Centric Security Technologies HOUSEKEEPING ITEMS All phone lines have been muted for the duration of the webinar.

More information

Coalfire Systems Inc.

Coalfire Systems Inc. Security Review Web with Page-Integrated Encryption (PIE) Technology Prepared for HP Security Voltage by: Coalfire Systems Inc. March 2, 2012 Table of contents 3 Executive Summary 4 Detailed Project Overview

More information

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has

More information

PCI DSS Compliance Services January 2016

PCI DSS Compliance Services January 2016 PCI DSS Compliance Services January 2016 20160104-Galitt-PCI DSS Compliance Services.pptx Agenda 1. Introduction 2. Overview of the PCI DSS standard 3. PCI DSS compliance approach Copyright Galitt 2 Introduction

More information

This article describes the history of the Payment Card

This article describes the history of the Payment Card Copyright 2007 ISACA. All rights reserved. www.isaca.org. Achieving Compliance With the PCI Data Security Standard By Alex Woda, CISA, QDSP, QPASP This article describes the history of the Payment Card

More information

Retour d'expérience PCI DSS

Retour d'expérience PCI DSS Retour d'expérience PCI DSS Frédéric Charpentier OSSIR : Retour d'expérience PCI DSS - 1 XMCO PARTNERS : Who are we? Xmco Partners is a consulting company specialized in IT security and advisory Xmco Partners

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

Introduction to the Russian Payment Market. Tristan Hugo-Webb. Analyst, International Advisory Service thugowebb@mercatoradvisorygroup.

Introduction to the Russian Payment Market. Tristan Hugo-Webb. Analyst, International Advisory Service thugowebb@mercatoradvisorygroup. INTRODUCTION TO THE RUSSIAN PAYMENT MARKET Tristan Hugo-Webb Analyst, International Advisory Service thugowebb@mercatoradvisorygroup.com 8 Clock Tower Place, Suite 420 Maynard, MA 01754 phone: 1(781) 419-1700

More information

PCI Compliance. PCI DSS v3.1. Dan Lobb CRISC. Lisa Gable CISM

PCI Compliance. PCI DSS v3.1. Dan Lobb CRISC. Lisa Gable CISM PCI Compliance PCI DSS v3.1 Dan Lobb CRISC Lisa Gable CISM Dan Lobb, CRISC o Introduction Dan has an MIS degree from the University of Central Florida. He began his career at Accenture and for the past

More information

2015 OUTLOOK: BANKING CHANNELS

2015 OUTLOOK: BANKING CHANNELS December 2014 2015 OUTLOOK: BANKING CHANNELS Moving from theory to practice Changes in banking channels are talking hold, embodying a transition from theoretical ideas to actual implementations of such

More information

We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating

We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating Given recent payment data breaches, clients are increasingly demanding robust security and fraud solutions; and Financial institutions continue to outsource and leverage technology providers given their

More information

PCI DSS 3.0 Changes & Challenges P R E S I D E N T/ C O - F O U N D E R F R S EC U R E

PCI DSS 3.0 Changes & Challenges P R E S I D E N T/ C O - F O U N D E R F R S EC U R E PCI DSS 3.0 Changes & Challenges EVAN FRANCEN, CISSP CISM P R E S I D E N T/ C O - F O U N D E R F R S EC U R E PCI DSS 3.0 Changes & Challenges Topics FRSecure, the company Introduction to PCI-DSS Recent

More information

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October 2015. cliftonlarsonallen.com. 2015 CliftonLarsonAllen LLP

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October 2015. cliftonlarsonallen.com. 2015 CliftonLarsonAllen LLP cliftonlarsonallen.com PCI Compliance What is New in Payment Card Industry Compliance Standards October 2015 Overview PCI DSS In the beginning Each major card brand had its own separate criteria for implementing

More information

How To Protect Your Credit Card Information From Being Stolen

How To Protect Your Credit Card Information From Being Stolen Visa Account Information Security Tool Kit Welcome to the Visa Account Information Security Program 2 Contents 1. Securing cardholder data is everyone s concern 4 2. Visa Account Information Security (AIS)

More information

Frequently Asked Questions

Frequently Asked Questions PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply

More information

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer Complying with the PCI DSS All the Moving Parts Don Roeber Vice President, PCI Compliance Manager Lisa Tedeschi Assistant Vice President, Compliance Officer Types of Risk Operational Risk Normal fraud

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

SafeNet DataSecure vs. Native Oracle Encryption

SafeNet DataSecure vs. Native Oracle Encryption SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises

More information

How To Protect Your Business From A Hacker Attack

How To Protect Your Business From A Hacker Attack Payment Card Industry Data Security Standards The payment card industry data security standard PCI DSS Visa and MasterCard have developed the Payment Card Industry Data Security Standard or PCI DSS as

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

Data-Centric Security vs. Database-Level Security

Data-Centric Security vs. Database-Level Security TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides

More information

Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director

Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director Thoughts on PCI DSS 3.0 D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director Agenda 1 2 3 Global Payment Card Statistics and Trends PCI DSS Overview PCI DSS Version 3.0: Important Timelines

More information

PCI DSS READINESS AND RESPONSE

PCI DSS READINESS AND RESPONSE PCI DSS READINESS AND RESPONSE EMC Consulting Services offers a lifecycle approach to holistic, proactive PCI program management ESSENTIALS Partner with EMC Consulting for your PCI program management and

More information

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand

More information

Achieving PCI Compliance for Your Site in Acquia Cloud

Achieving PCI Compliance for Your Site in Acquia Cloud Achieving PCI Compliance for Your Site in Acquia Cloud Introduction PCI Compliance applies to any organization that stores, transmits, or transacts credit card data. PCI Compliance is important; failure

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

Third Party Agent Registration and PCI DSS Compliance Validation Guide

Third Party Agent Registration and PCI DSS Compliance Validation Guide Visa Europe Third Party Agent Registration and PCI DSS Compliance Validation Guide May 2016 Version 1.3 Visa Europe 2015 Contents 1 Introduction... 4 1.1 Definitions of Agents... 4 2 Registration Process...

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

AISA Sydney 15 th April 2009

AISA Sydney 15 th April 2009 AISA Sydney 15 th April 2009 Where PCI stands today: Who needs to do What, by When Presented by: David Light Sense of Security Pty Ltd Agenda Overview of PCI DSS Compliance requirements What & When Risks

More information

The PCI DSS Compliance Guide For Small Business

The PCI DSS Compliance Guide For Small Business PCI DSS Compliance in a hosted infrastructure A Rackspace White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

Project Title slide Project: PCI. Are You At Risk?

Project Title slide Project: PCI. Are You At Risk? Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services

More information

Registration and PCI DSS compliance validation

Registration and PCI DSS compliance validation Visa Europe A Guide for Third Party Agents Registration and PCI DSS compliance validation October 2015 Version 1.1 Visa Europe 2015 Contents 1 Introduction... 4 1.1 Definitions of Agents... 4 2 Registration

More information

Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance

Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance Emerging Technology Whitepaper Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance For Transmissions of Cardholder Data and Sensitive Authentication Data Program Guide Version

More information

Payment Application Data Security Standard

Payment Application Data Security Standard Payment Card Industry (PCI) Payment Application Data Security Standard ROV Reporting Instructions for PA-DSS v2.0 March 2012 Changes Date March 2012 Version Description Pages 1.0 To introduce PA-DSS ROV

More information

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600 Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle

More information

PCI Compliance 2012 - The Road Ahead. October 2012 Hari Shah & Parthiv Sheth

PCI Compliance 2012 - The Road Ahead. October 2012 Hari Shah & Parthiv Sheth PCI Compliance 2012 - The Road Ahead October 2012 Hari Shah & Parthiv Sheth What s the latest? Point-to-Point Encryption (P2PE) Program Guide Updated Solution Requirements and Testing Procedures for hardware-based

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.0 February 2014 Section 1: Assessment Information Instructions for Submission

More information

PCI Standards: A Banking Perspective

PCI Standards: A Banking Perspective Slide 1 PCI Standards: A Banking Perspective Bob Brown, CISSP Wachovia Corporate Information Security Slide 2 Agenda 1. Payment Card Initiative History 2. Description of the Industry 3. PCI-DSS Control

More information

5 Things to Look for in a Cloud Provider When it Comes to Security

5 Things to Look for in a Cloud Provider When it Comes to Security 5 Things to Look for in a Cloud Provider When it Comes to Security In This Paper Internal technology services that lack resources, rigor or efficiencies are prime candidates for the cloud Understand the

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments Security in the Payment Card Industry OWASP AppSec Seattle Oct 2006 Hap Huynh, Information Security Specialist, Visa USA hhuynh@visa.com Copyright 2006 - The OWASP Foundation Permission is granted to copy,

More information

SOCIAL MEDIA ANALYTICS AND TOOLS 101

SOCIAL MEDIA ANALYTICS AND TOOLS 101 SOCIAL MEDIA ANALYTICS AND TOOLS 101 Ken Paterson VP Research Operations/ Director, Credit Advisory Service kpaterson@mercatoradvisorygroup.com 8 Clock Tower Place, Suite 420 Maynard, MA 01754 phone: 1(781)

More information

Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide

Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide. Four steps for success Implementing a Data Loss Prevention solution to address PCI requirements may be broken into four key

More information

PCI Compliance Just the Facts. Rick Dakin President Rick.dakin@CoalfireSystems.com 303.554.6333 ext. 7001

PCI Compliance Just the Facts. Rick Dakin President Rick.dakin@CoalfireSystems.com 303.554.6333 ext. 7001 PCI Compliance Just the Facts Rick Dakin President Rick.dakin@CoalfireSystems.com 303.554.6333 ext. 7001 Agenda Regulatory Landscape Scary Bedtime Stories What went wrong? PCI Compliance Process o What

More information