Effectively Managing Data Breaches
|
|
|
- Brice Short
- 10 years ago
- Views:
Transcription
1 Effectively Managing Data Breaches May 27, 2015 Stoddard Lambertson Cyber Intelligence and Investigations Justina Jow Cyber Intelligence and Investigations
2 Disclaimer The information or recommendations contained herein are provided "AS IS" and intended for informational purposes only and should not be relied upon for operational, marketing, legal, technical, tax, financial or other advice. When implementing any new strategy or practice, you should consult with your legal counsel to determine what laws and regulations may apply to your specific circumstances. The actual costs, savings and benefits of any recommendations or programs may vary based upon your specific business needs and program requirements. By their nature, recommendations are not guarantees of future performance or results and are subject to risks, uncertainties and assumptions that are difficult to predict or quantify. Assumptions were made by us in light of our experience and our perceptions of historical trends, current conditions and expected future developments and other factors that we believe are appropriate under the circumstance. Recommendations are subject to risks and uncertainties, which may cause actual and future results and trends to differ materially from the assumptions or recommendations. Visa is not responsible for your use of the information contained herein (including errors, omissions, inaccuracy or nontimeliness of any kind) or any assumptions or conclusions you might draw from its use. Visa makes no warranty, express or implied, and explicitly disclaims the warranties of merchantability and fitness for a particular purpose, any warranty of non-infringement of any third party's intellectual property rights, any warranty that the information will meet the requirements of a client, or any warranty that the information is updated and will be error free. To the extent permitted by applicable law, Visa shall not be liable to a client or any third party for any damages under any theory of law, including, without limitation, any special, consequential, incidental or punitive damages, nor any damages for loss of business profits, business interruption, loss of business information, or other monetary loss, even if advised of the possibility of such damages. 2 Effectively Managing Data Breaches May 27, 2015
3 Agenda Introduction Compromise Event Trends and Segments Merchant Servicer (POS) Integrator Threats and Best Practices PCI Qualified Integrators and Resellers (QIR) Common Point of Purchase Process Flow Small Merchant Investigations and Common Point of Purchase Process Large Merchant Investigations (Acquirer and Merchant Responsibilities) Upcoming Events and Resources Questions and Answers 3 Effectively Managing Data Breaches May 27, 2015
4 Recent Fraud Trends and Small Merchant Investigations Stoddard Lambertson Cyber Intelligence and Investigations
5 Trends in Data Compromises Criminals are launching more sophisticated attacks targeting small merchants FREQUENCY MAGNITUDE SOPHISTICATION ORGANIZATION 5 Effectively Managing Data Breaches May 27, 2015
6 Visa Inc. CAMS Compromise Events Entity Type by Month Apr-13 May-13 Jun-13 Jul-13 Aug-13 Sep-13 Oct-13 Source: Compromised Account Management System (CAMS) Original IC and PA Alerts for Visa Inc. 6 Effectively Managing Data Breaches May 27, 2015 Nov-13 Dec-13 Jan-14 Feb-14 Mar-14 Apr-14 May-14 Jun-14 Jul-14 Aug-14 Sep-14 Oct-14 Nov-14 Dec-14 Jan-15 Feb-15 Mar-15 Apr-15 Brick & Mortar Ecommerce Processor / Agent
7 Visa Inc. CAMS Compromise Events Top Market Segment* (MCC) Restaurants and retailers are leading market segments in the first quarter of 2015 Integrators and resellers implementing insecure remote access and poor credential management are targeted by hackers RESTAURANTS OTHER RETAIL QSR'S B2B SUPERMARKETS LODGING * Market Segment based on Acceptance Solutions MCC Market Segment category Source: Compromised Account Management System (CAMS) Original IC and PA Alerts Q15 7 Effectively Managing Data Breaches May 27,
8 Recent Threats due to Merchant Servicers POS Integrators/Resellers may provide merchant POS software installation and ongoing enterprise support for your POS system Merchant setup may include Remote Access Services (RAS) for monitoring and software support etc. Use of remote management products comes with an inherent level of risk that may create a virtual backdoor on your POS system Results in installation of malware to capture card data Integrators may have access to POS system - however PCI compliance not maintained Multiple POS Integrator related compromises since June 2014 Non-Compliant Integrators / Merchants set up with default / shared remote access IDs without two-factor authentication or regular password changes 8 Effectively Managing Data Breaches May 27, 2015
9 PCI Qualified Integrators and Resellers (QIR) QIRs receive training and qualification on the secure installation of PA-DSS validated payment applications into merchant environments in a manner that supports PCI DSS compliance Demand that your POS Integrator be qualified and listed by the PCI SSC Use of a QIR will: Help protect your organization Improve security Reduce risk and help maintain PCI DSS compliance Simplify the vendor selection process 9 Effectively Managing Data Breaches May 27, 2015
10 PCI Approved QIR Companies Ask your Integrator/Reseller to become trained and qualified to be listed as a QIR Currently the following entities are PCI Approved QIR Companies: Amano McGann, Inc. emazzanti Technologies Fujitsu Services Limited Reliant Info Security Inc. Traffic & Safety Control Systems, Inc. Xpient Solutions LLC 10 Effectively Managing Data Breaches May 27, 2015
11 Visa Recommends Using PCI SSC Qualified Integrators and Resellers In support of the PCI SSC Qualified Integrators and Resellers Program, Visa is expanding the definition of a Merchant Servicer to be an entity that stores, processes, transmits or has access to Visa account numbers on behalf of a client s merchants. Bulletin posted on Effective 1 June 2015, Visa will add integrators and resellers to the Visa Global Registry of Service Providers that have: 1. Successfully completed the PCI Qualified Integrators and Resellers Program 2. Are included on the PCI SSC s Qualified Integrators and Resellers list 3. Have self-identified with Visa through the Merchant Servicer Self-Identification Program The merchant servicer program fee will be waived for Qualified Integrators and Resellers that register in Effectively Managing Data Breaches May 27, 2015
12 Cyber Intelligence & Investigations - Small Merchant Investigations Most reported CPPs result in the detection of a small merchant (Level 4) breach A Common Point of Purchase (CPP) is determined when issuing clients identify a subset of accounts with legitimate cardholder usage, containing a single common merchant identifier prior to fraudulent activity and not associated with a previously reported data compromise event. Level 4 merchants process less than 20,000 Visa e-commerce transactions annually and all other merchants processing up to 1 million Visa transactions annually Visa s Small Merchant Investigations primarily focuses on: Engaging issuers to report accurate CPPs via feedback and analytics Notifying acquirers of CPPs Providing support to acquirer investigations with Merchant Conversion Rate analytics Identifying key compromise trends: o Geography, vendor, agent and merchant types o Cyber intelligence community and Law Enforcement engagements o Common vulnerabilities being exploited (i.e. remote access) 12 Effectively Managing Data Breaches May 27, 2015
13 Common Point of Purchase Process Flow Goal is to Contain compromises quickly and Mitigate Issuer losses by sending at-risk accounts via Proactive Comprised Account Management System (CAMS) alerts Visa Small Merchant Investigations Receive Suspected Common Point of Purchase (CPP) Reports Visa validates Merchant and Acquirer information Fraud Incident Tracking Case Created / Updated Visa sends CPP details to Acquirer to investigate Visa sends At- Risk accounts to Issuers for CPPs reported by 2 or more issuers Acquirer Bank Investigations Acquirer receives CPP report from Visa Acquirer begins investigation & containment process Acquirer has 10 days to contain breach Once contained acquirer validates merchant is compliant Acquirer reports to Visa that case is contained and merchant compliant 13 Effectively Managing Data Breaches May 27, 2015
14 Small Merchant Security Safeguards Change Default Passwords Install Antivirus Enable Remote Access Only When Needed Use only PCI Approved QIRs Use only Registered Agents Ease of Implementation Easy Medium Easy Easy Easy Cost None Medium None None None Effectiveness Medium Medium High High High *Based on PCI Forensic Investigation Reports of Small Merchants 14 Effectively Managing Data Breaches May 27, 2015
15 Large Merchant Investigations Justina Jow Cyber Intelligence and Investigations
16 Prevention and Detection Strategies Communication Incident Response PCI Compliance Organization Readiness Remain vigilant and be prepared!!! Fraudsters target the weakest link and can evolve quickly 16 Effectively Managing Data Breaches May 27, 2015
17 What To Do Before You Are Compromised* Review and understand the fraud investigation procedures: What To Do If Compromised Located on the Protect Your Business section under Merchants on Visa.com Actively review Alerts, Bulletins, & Webinars RawPOS Malware Targeting Lodging Merchants March 2015 Carbanak Advanced Persistent Threat March 2015 Identifying & Mitigating Threats to E-commerce Payment Environments April 2015 Ensure an Incident Response (IR) plan is in place Prepare and regularly test plan Know your business Know what steps to take Know who and when to call *Summarized from What To Do If Compromised (WTDIC). For more comprehensive information, please refer to WTDIC, located on 17 Effectively Managing Data Breaches May 27, 2015
18 What To Do Before You Are Compromised* (cont.) Designate and empower an internal breach response team Educate employees on indicators of compromise and how to respond Create mock exercise to test and refine procedures Develop breach response communications Identify and establish relationships and/or agreements with federal law enforcement (i.e., USSS, FBI) and key vendors Electronic Crimes Task Force (ECTF) Establish and maintain an ongoing PCI DSS compliance program *Summarized from Responding to a Data Breach: Communications Guidelines for Merchants, located on 18 Effectively Managing Data Breaches May 27, 2015
19 What To Do If Compromised* Indicators of a Data Breach Visa notification of Common Point of Purchase (CPP) identification Customer complaints of fraudulent activity on payment cards Law enforcement notification Bank reports of fraud after legitimate use Abnormal activity/behavior of Point of Sale (POS) Requirements for Compromised Entities (pages 7-9 of WTDIC) Immediately contain and limit the exposure Preserve evidence and facilitate the investigation Alert all necessary parties Contact the appropriate law enforcement agency If deemed necessary, an independent forensic investigation will be initiated *Summarized from What To Do If Compromised (WTDIC). For more comprehensive information, please refer to WTDIC, located on 19 Effectively Managing Data Breaches May 27, 2015
20 What To Do If Compromised* (cont.) Notification Immediately report suspected or confirmed unauthorized access or data exposure to the Visa Risk group Visa Cyber Intelligence & Investigations or , option 4 Evidence preservation (page 7 from WTDIC) Do not access or alter compromised systems Preserve all evidence and logs Payment Card Industry Forensic Investigation may be required (page 9 from WTDIC) Communication Plan Merchants can consult with Visa Corporate Communications for assistance in preparing a public breach response Responding to a Data Breach: Communications Guidelines for Merchants *Summarized from What To Do If Compromised (WTDIC). For more comprehensive information, please refer to WTDIC, located on 20 Effectively Managing Data Breaches May 27, 2015
21 Merchant Responsibilities* Notification Alert your acquiring bank immediately Notify your QIR (Third Party Integrator) Initial Containment Immediately contain and limit the data exposure and minimize data loss Preservation Preserve evidence and facilitate the investigation Forensic engagement Visa may require an onsite forensic investigation for any merchant that has not contained the initial event Avoid Conflicts of Interest (COI) - QSA vs PFI Validate PCI Compliance *Summarized from What To Do If Compromised (WTDIC). For more comprehensive information, please refer to WTDIC, located on 21 Effectively Managing Data Breaches May 27, 2015
22 Acquirer Responsibilities Notification Report any suspected breach to Visa immediately Coordinate the investigation until its completion Organize conference calls with merchant / acquirer / Visa Provide ongoing updates Forensic engagement (work with the merchant to obtain an approved PCI Forensic Investigator (PFI)) Provide the PFI identity to Visa Avoid Conflicts of Interest (COI) - QSA vs PFI PFI must be onsite to conduct a forensic investigation as soon as possible from the date the contract agreement is signed Confirm with PFI that incident is fully contained Provide a copy of the completed forensic report as outlined in the PFI program guide Provide Visa with potential at-risk accounts for distribution to impacted issuing banks 22 Effectively Managing Data Breaches May 27, 2015
23 Implement Secure Technology Benefits of EMV and Upcoming Liability Shift Implement EMV Chip Terminals EMV chip or smart cards are credit, debit or prepaid cards that have an embedded microchip Microchip generates a dynamic one-time use code (a cryptogram) Prevents the data being re-used to create counterfeit cards Reduces overall PCI scope Implement Tokenization Token replaces account number with unique digital token If payment token is used as the account number, it will be identified as stolen and rejected Devalues payment card data Implement Point to Point Encryption Secures the payment card transaction from swipe to processor Implement an approved PCI PTS terminal Reduces overall PCI scope Benefits of Implementing Secure Technology Reduce your liability from counterfeit fraud Reduce risk to the Payment System Partner with your Integrator/Reseller to simplify implementation Reduce your overall PCI scope Enroll in the Secure Acceptance Incentive Program that grants safe harbor from non-compliance fines Liability Shift Effective October 1, 2015, counterfeit liability shift will be instituted in the U.S for POS transactions. The party that is the cause of a chip transaction not occurring will be held financially liable for any resulting card present counterfeit fraud losses. The shift helps to better protect all parties by encouraging chip transactions that use unique, dynamic authentication data. 23 Effectively Managing Data Breaches May 27, 2015
24 Visa is hosting a must-attend event that will focus on trends and developments related to cyber security, mobile payments, e-commerce and Visa s global authentication strategy. In order to secure the future of commerce all stakeholders including merchants, acquirers, agents and Visa need to collaborate on key initiatives in addressing today s most relevant issues. This event will be held in the San Francisco Bay Area at the Hyatt Regency Hotel just south of San Francisco. 24 Effectively Managing Data Breaches May 27,
25 Upcoming Events and Resources Upcoming Webinars Under Merchant Resources/Training on Minimizing Payment Risks for Merchants Using Integrators / Resellers 17 June 2015, 10 am PST Visa Launches EMV Chip Education Tour for Small Businesses 20-City Tour for Small Businesses Visa Online Merchant Tool Kit provides helpful information to make a seamless EMV transition Streamline your chip migration Visa Data Security Website Alerts, Bulletins Best Practices, White Papers Webinars PCI Security Standards Council Website Data Security Standards, QIR Listing Fact Sheets Mobile Payments Acceptance, Tokenization, and many more 25 Effectively Managing Data Breaches May 27, 2015
26 Questions?
Data Security Basics for Small Merchants
Data Security Basics for Small Merchants 28 October 2015 Stan Hui Director, Merchant Risk Lester Chan Director, Merchant Risk Disclaimer The information or recommendations contained herein are provided
Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security
Breach Findings for Large Merchants 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security Disclaimer The information or recommendations contained herein are
Third Party Risk Management Basics. Webinar. 26 February 2015
Third Party Risk Management Basics Webinar 26 February 2015 Stan Hui Payment System Security Oscar Munoz Third Party Risk Roxanne Baumann Third Party Risk Disclaimer The information or recommendations
2015 Visa Payment Security Symposium Webinar
The Power of Partnership AUGUST 12-13 HYATT REGENCY BURLINGAME, CA 2015 Visa Payment Security Symposium Webinar Diana Greenhaw Sr. Director, Global Data Security and Third Party Risk Lester Chan Director,
Payment Card Data and Protected Health Information Security Practices
Payment Card Data and Protected Health Information Security Practices Andrew Sierra Merchant Risk Lester Chan Merchant Security August 5, 2015 Disclaimer The information or recommendations contained herein
Identifying and Mitigating Threats to E-commerce Payment Processing
Identifying and Mitigating Threats to E-commerce Payment Processing Erik Rasmussen Director, NA Cyber Security Intelligence Visa Inc. 29 April 2015 Disclaimer The information or recommendations contained
Webinar - Skimming and Fraud Protection for Petroleum Merchants. November 14 th 2013
Webinar - Skimming and Fraud Protection for Petroleum Merchants November 14 th 2013 Disclaimer The information or recommendations contained herein are provided "AS IS" and intended for informational purposes
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
Securing The Data. Payment System Forum Bank Negara Malaysia. 27 th November 2014. Murugesh Krishnan Head of Risk, South & Southeast Asia
Securing The Data Payment System Forum Bank Negara Malaysia 27 th November 2014 Murugesh Krishnan Head of Risk, South & Southeast Asia Disclaimer Case studies, statistics, research and recommendations
MITIGATING LARGE MERCHANT DATA BREACHES
MITIGATING LARGE MERCHANT DATA BREACHES Tia D. Ilori Ed Verdurmen January 2014 1 DISCLAIMER The information or recommendations contained herein are provided "AS IS" and intended for informational purposes
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013
Encryption and Tokenization: Protecting Customer Data Your Payments Universally Amplified Tia D. Ilori Sue Zloth September 18, 2013 Agenda Global Threat Landscape Real Cost of a Data Breach Evolution of
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
Visa global Compromised Account
Visa global Compromised Account RECOVERY PROGRAM WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT The Visa Global Compromised Account Recovery (GCAR) program offers
How To Protect Visa Account Information
Account Information Security Merchant Guide At Visa, protecting our cardholders is at the core of everything we do. One of the many reasons people trust our brand is that we make buying and selling safer
AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009
AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application
PCI Compliance Overview
PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)
Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation
Your Single Source for credit, debit and pre-paid services Fraud Risk and Mitigation Agenda Types of Fraud Fraud Identification Notifications Next Steps 11/8/2013 2 Types of Fraud Lost and Stolen Cards
Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.
Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History
Implement Effective Penetration Testing
Implement Effective Penetration Testing Ed Verdurmen Visa - Moderator Navid Jam FireEye Rob Chahin & Kevin Dunn NCC Group Ryan Wakeham & Scott Sutherland netspi August 25, 2015 Notice of Disclaimer The
PCI Security Standards Council
PCI Security Standards Council Jeremy King, European Director 2013 Why PCI Matters Applying PCI How You Can Participate Agenda 2 Why PCI Matters Applying PCI How You Can Participate Agenda About the PCI
Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014
Are You Ready For PCI v 3.0 Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014 Today s Presenter Corbin Del Carlo QSA, PA QSA Director, National Leader PCI Services Practice 847.413.6319
For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at www.visa.
Global Partner Management Notice Subject: Visa Data Security Alert Malicious Software and Internet Protocol Addresses Dated: April 10, 2009 Announcement: The protection of account information is a responsibility
MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.
MasterCard PCI & Site Data Protection (SDP) Program Update Academy of Risk Management Innovate. Collaborate. Educate. The Payment Card Industry Security Standards Council (PCI SSC) Open, Global Forum Founded
Visa PIN Security Program Webinar May 2015. Alan Low PIN Risk Representative AP and CEMEA. Visa Public
Visa PIN Security Program Webinar May 2015 Alan Low PIN Risk Representative AP and CEMEA Disclaimer The information or recommendations contained herein are provided "AS IS" and are intended to be information
PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz
PCI-DSS: A Step-by-Step Payment Card Security Approach Amy Mushahwar & Mason Weisz The PCI-DSS in a Nutshell It mandates security processes for handling, processing, storing and transmitting payment card
Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)
Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions Version 5.0 (April 2011) Contents Contents...2 Introduction...3 What are the 12 key requirements of
Continuous compliance through good governance
PCI DSS Compliance: A step into the payment ecosystem and Nets compliance program Continuous compliance through good governance Who are the PCI SSC? The Payment Card Industry Security Standard Council
8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year
Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions
American Express Data Security Operating Policy United States
American Express Data Security Operating Policy United States As a leader in consumer protection, American Express has a long-standing commitment to protect Cardmember Information, ensuring that it is
SecurityMetrics Introduction to PCI Compliance
SecurityMetrics Introduction to PCI Compliance Card Data Compromise What is a card data compromise? A card data compromise occurs when payment card information is stolen from a merchant. Some examples
Project Title slide Project: PCI. Are You At Risk?
Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services
Payment Card Industry Data Security Standards
Payment Card Industry Data Security Standards Discussion Objectives Agenda Introduction PCI Overview and History The Protiviti Difference Questions and Discussion 2 2014 Protiviti Inc. CONFIDENTIAL: This
Data Security for the Hospitality
M&T Bank and SecurityMetrics Present: Data Security for the Hospitality Industry Featuring Lee Pierce, SecurityMetricsStrategicStrategic Accounts Dave Ellis, SecurityMetrics Forensic Investigator Doug
New PCI Standards Enhance Security of Cardholder Data
December 2013 New PCI Standards Enhance Security of Cardholder Data By Angela K. Hipsher, CISA, QSA, Jeff A. Palgon, CPA, CISSP, QSA, and Craig D. Sullivan, CPA, CISA, QSA Payment cards a favorite target
Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc.
Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc. Before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the House Committee on
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
PCI Compliance Top 10 Questions and Answers
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.
Payment Methods The cost of doing business Michelle Powell - BASYS Processing, Inc. You ve got to spend money, to make money Major Industry Topics Industry Process Flow PCI DSS Compliance Risks of Non-Compliance
White Paper: Are there Payment Threats Lurking in Your Hospital?
White Paper: Are there Payment Threats Lurking in Your Hospital? With all the recent high profile stories about data breaches, payment security is a hot topic in healthcare today. There s been a steep
How To Protect Your Data From Being Stolen
DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS
How To Protect Your Business From A Hacker Attack
Payment Card Industry Data Security Standards The payment card industry data security standard PCI DSS Visa and MasterCard have developed the Payment Card Industry Data Security Standard or PCI DSS as
How To Protect Your Credit Card Information From Being Stolen
Visa Account Information Security Tool Kit Welcome to the Visa Account Information Security Program 2 Contents 1. Securing cardholder data is everyone s concern 4 2. Visa Account Information Security (AIS)
Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance
Payment Security White Paper Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance Breaches happen across all industries as thieves look for vulnerabilities.
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
Josiah Wilkinson Internal Security Assessor. Nationwide
Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges
Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance
Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance March 29, 2012 1:00 p.m. ET If you experience any technical difficulties, please contact 888.228.0988 or [email protected]
V ISA SECURITY ALERT 13 November 2015
V ISA SECURITY ALERT 13 November 2015 U P DATE - CYBERCRIMINALS TARGE TING POINT OF SALE INTEGRATORS Distribution: Value-Added POS Resellers, Merchant Service Providers, Point of Sale Providers, Acquirers,
Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments
Security in the Payment Card Industry OWASP AppSec Seattle Oct 2006 Hap Huynh, Information Security Specialist, Visa USA [email protected] Copyright 2006 - The OWASP Foundation Permission is granted to copy,
The Relationship Between PCI, Encryption and Tokenization: What you need to know
October 2014 The Relationship Between PCI, Encryption and Tokenization: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems,
Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer
Complying with the PCI DSS All the Moving Parts Don Roeber Vice President, PCI Compliance Manager Lisa Tedeschi Assistant Vice President, Compliance Officer Types of Risk Operational Risk Normal fraud
PCI DSS Payment Card Industry Data Security Standard. Merchant compliance guidelines for level 4 merchants
Appendix 2 PCI DSS Payment Card Industry Data Security Standard Merchant compliance guidelines for level 4 merchants CONTENTS 1. What is PCI DSS? 2. Why become compliant? 3. What are the requirements?
Payment Card Industry Data Security Standard (PCI DSS)
Payment Card Industry Data Security Standard (PCI DSS) Compliance Guide for Merchants Presented by: www.complianceforge.com Copyright 2015. BlackHat Consultants, LLC Table of Contents PAYMENT CARD INDUSTRY
TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business
TAKING OUR CUSTOMERS BUSINESS FORWARD The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment
PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES
PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES CUTTING THROUGH THE COMPLEXITY AND CONFUSION Over the years, South African retailers have come under increased pressure to gain PCI DSS (Payment Card Industry
What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures
What To Do if Compromised Visa USA Fraud Investigations and Incident Management Procedures Table of Contents Introduction......................................................... 1 Security Breach Reporting............................................
Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015
PCI compliance: v3.1 Key Considerations Corbin Del Carlo Director, National Leader PCI Services October 5, 2015 Today s Presenter Corbin Del Carlo QSA, PA QSA Director, National Leader PCI Services Practice
PCI: It Never Ends. Why?
PCI: It Never Ends. Why? How to stay prepared? Shekar Swamy American Technology Corporation St. Louis, MO January 13, 2011 PCI compliance basics It s all about Data Security 12 major areas of compliance
WHITE PAPER. PCI Basics: What it Takes to Be Compliant
WHITE PAPER PCI Basics: What it Takes to Be Compliant Introduction A long-running worldwide advertising campaign by Visa states that the card is accepted everywhere you want to be. Unfortunately, and through
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE WHAT IS PCI DSS? Payment Card Industry Data Security Standard Information security standard for organizations that handle data for debit, credit, prepaid, e-purse, ATM,
Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director
Thoughts on PCI DSS 3.0 D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director Agenda 1 2 3 Global Payment Card Statistics and Trends PCI DSS Overview PCI DSS Version 3.0: Important Timelines
mobile payment acceptance Solutions Visa security best practices version 3.0
mobile payment acceptance Visa security best practices version 3.0 Visa Security Best Practices for, Version 3.0 Since Visa s first release of this best practices document in 2011, we have seen a rapid
SecurityMetrics. PCI Starter Kit
SecurityMetrics PCI Starter Kit Orbis Payment Services, Inc. 42 Digital Drive, Suite 1 Novato, CA 94949 USA Dear Merchant, Thank you for your interest in Orbis Payment Services as your merchant service
Your Compliance Classification Level and What it Means
General Information What are the Payment Card Industry (PCI) Data Security Standards? The PCI Data Security Standards represents a common set of industry tools and measurements to help ensure the safe
PCI Security Standards Council
PCI Security Standards Council Bob Russo, General Manager 2013 Why PCI Matters Applying PCI How You Can Participate Agenda About the PCI Council Open, global forum Founded 2006 Guiding open standards for
Introduction to PCI DSS Compliance. May 18, 2009 1:15 p.m. 2:15 p.m.
Introduction to PCI DSS Compliance May 18, 2009 1:15 p.m. 2:15 p.m. Disclaimer The opinions of the contributors expressed herein do not necessarily state or reflect those of the National Association of
Foregenix Incident Response Handbook. A comprehensive guide of what to do in the unfortunate event of a compromise
Foregenix Incident Response Handbook A comprehensive guide of what to do in the unfortunate event of a compromise Breadth of Expertise - You re in safe hands Foregenix is a global Information Security
What a Processor Needs from a University to Validate Compliance
What a Processor Needs from a University to Validate Compliance Lisa T. Conroy Merchant Compliance Manager Vantiv May 24, 2016 Disclosures The information included in this presentation is for information
Frequently Asked Questions
PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply
PREVENTING PAYMENT CARD DATA BREACHES
NEW SCIENCE TRANSACTION SECURITY ARTICLE PREVENTING PAYMENT CARD DATA BREACHES DECEMBER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction
Fraud Protection, You and Your Bank
Fraud Protection, You and Your Bank Maximize your chances to minimize your losses Presentation for Missouri GFOA April 2011 By: Terry Endres, VP, Government Treasury Solutions Phone: 314-466-6774 [email protected]
PCI Compliance: How to ensure customer cardholder data is handled with care
PCI Compliance: How to ensure customer cardholder data is handled with care Choosing a safe payment process for your business Contents Contents 2 Executive Summary 3 PCI compliance and accreditation 4
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics About Us Matt Halbleib CISSP, QSA, PA-QSA Manager PCI-DSS assessments With SecurityMetrics for 6+ years SecurityMetrics Security
Payment Security Account Data Compromise (ADC)
Payment Security Account Data Compromise (ADC) 10 th July 2014 Michael Christodoulides & Louise Hunt All information correct at time of presentation Introductions Barclaycard has become increasingly aware
How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants
How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material
Card Network Update Chip (EMV) Acceptance in the United States At-A-Glance
Card Network Update Chip (EMV) Acceptance in the United States At-A-Glance Allegiance Merchant Services is committed to assisting you in navigating through the various considerations that you may face
PCI PA-DSS Requirements. For hardware vendors
PCI PA-DSS Requirements For hardware vendors PCI security services UL's streamlined PCI PA-DSS certification services get your product to market faster. UL is world leader in advancing safety. Through
