Payment Card Data and Protected Health Information Security Practices
|
|
|
- Sybil Robbins
- 9 years ago
- Views:
Transcription
1 Payment Card Data and Protected Health Information Security Practices Andrew Sierra Merchant Risk Lester Chan Merchant Security August 5, 2015
2 Disclaimer The information or recommendations contained herein are provided "AS IS" and intended for informational purposes only and should not be relied upon for operational, marketing, legal, technical, tax, financial or other advice. When implementing any new strategy or practice, you should consult with your legal counsel to determine what laws and regulations may apply to your specific circumstances. The actual costs, savings and benefits of any recommendations or programs may vary based upon your specific business needs and program requirements. By their nature, recommendations are not guarantees of future performance or results and are subject to risks, uncertainties and assumptions that are difficult to predict or quantify. Assumptions were made by us in light of our experience and our perceptions of historical trends, current conditions and expected future developments and other factors that we believe are appropriate under the circumstance. Recommendations are subject to risks and uncertainties, which may cause actual and future results and trends to differ materially from the assumptions or recommendations. Visa is not responsible for your use of the information contained herein (including errors, omissions, inaccuracy or non-timeliness of any kind) or any assumptions or conclusions you might draw from its use. Visa makes no warranty, express or implied, and explicitly disclaims the warranties of merchantability and fitness for a particular purpose, any warranty of non-infringement of any third party's intellectual property rights, any warranty that the information will meet the requirements of a client, or any warranty that the information is updated and will be error free. To the extent permitted by applicable law, Visa shall not be liable to a client or any third party for any damages under any theory of law, including, without limitation, any special, consequential, incidental or punitive damages, nor any damages for loss of business profits, business interruption, loss of business information, or other monetary loss, even if advised of the possibility of such damages. 2 Payment Card Data and Protected Health Information Security Practices 8/5/2015
3 Agenda Global Data Compromises Cyber Threats and Attacks Latest Data Breaches Monetizing PII/PHI versus Payment Card Data Differences Between Security Standards Threats and Risks to Payment Card Data PII/PHI Going Above and Beyond Security Standards Key Takeaways 3 Payment Card Data and Protected Health Information Security Practices 8/5/2015
4 # of compromises Global Data Compromises 1200 Compromise Cases by Region % % 11% 16% 15% % 19% 11% % % 69% 73% 72% LAC CEMEA AP VE NA Global data compromise events grew 23% in 2014 over those managed in 2013 The U.S. is the largest contributor, mainly due to its large mag stripe infrastructure and an increase in successful attacks on third party service providers VE and AP represent the next largest contributors to known breach events, together compromising a quarter of the total Breaches in VE and AP are primarily CNP (93% for VE; 94% for AP) 4 Payment Card Data and Protected Health Information Security Practices 8/5/2015
5 Merchant Data Compromises Breach trends by merchant level and Merchant Category Code Breach Events by Merchant Level Entity Type % % % Level 1 <1% 1% 1% Level 2 <1% 1% 1% Level 3 1% 4% 4% Level 4 95% 92% 93% Agent <1% 1% 1% Other 2% <1% 0% Total 100% 100% 100% Percent of Breach Events by MCC 45% 38% 32% 21% 19% 15% 10% 7% 6% 4% 4% 3% 4% 4% 2% 2% 3% 2% RESTAURANTS OTHER RETAIL QSR'S B2B SUPERMARKETS LODGING While level 4 (small) merchants account for the largest number of known breach events (93% in 2014), the largest impact comes from Level 1 (large) merchant breaches Approximately, 77% of at risk accounts in 2014 were tied back to L1 merchants Restaurants and other retail make up the biggest portion of total known breaches (32% and 19%, respectively, in 2014) Quick service restaurants, supermarkets, and lodging make up the other top MCCs High-volume restaurants and retailers continue to be at risk 5 Payment Card Data and Protected Health Information Security Practices 8/5/2015
6 Data Compromises Common breach patterns Entry Card Data Theft Monetization Hackers targeting internet-exposed remote access systems as initial intrusion points Once in, attackers conduct network reconnaissance using diagnostic tools/techniques to identify systems with access to payment data and isolate specific user accounts They create custom attack scripts and tools inside the merchant s network to further extend access Payment card data is extracted with specialized, difficult to detect malware Malware is named to appear as legitimate security software, in some cases Card data is encrypted to avoid detection In many recent instances, traces of attacker activity are removed, including self-deleting malware Payment data is used to commit fraud, often across countries via coordinated criminal activity - ATMs - Gift cards - High-value goods Cards carry a typical value of between $20-$50 on markets for stolen data Note: There may be a significant lag between a breach and monetization 6 Payment Card Data and Protected Health Information Security Practices 8/5/2015
7 Latest Data Breaches Lester Chan Merchant Security CISSP, CISA, CISM, Certified HIPAA Professional
8 Healthcare Data Breaches Per Year Number of records 90,000,000 80,000,000 70,000,000 60,000,000 50,000,000 40,000,000 30,000,000 20,000,000 10,000, * Source: Forbes, Health Data Breach At Anthem Is A Blockbuster That Could Affect 80 Million, February 5, Payment Card Data and Protected Health Information Security Practices 8/5/2015
9 Largest Healthcare Data Breaches IBM 1.9 million GRM 1.7 million Xerox 2 million Montana Dept of Health 1 million Nemours 1 million Advocate Medical Grp 4 million Blue Cross 1 million AvMed Community 1.2 million Health Systems 4.5 million SAIC 4.9 million 9 Payment Card Data and Protected Health Information Security Practices 8/5/2015
10 Office of Personnel Management Breach Not healthcare but PII breach with significant impact Records include 1.1 million fingerprint records On June 12, the U.S. government determined an additional 14 million records were stolen by hackers. The OPM had no dedicated IT security staff until million 14 million 4.2 million On July 9, OPM discloses that 21 million PII records were compromised by hackers. Stolen records includes background checks and security clearances for government employees and their families On June 5, hackers exfiltrated 4.2 million U.S. federal personnel records. 10 Payment Card Data and Protected Health Information Security Practices 8/5/2015
11 Exfiltration and Monetizing Payment Card Data Fraudsters can easily monetize stolen payment card data Data Exfiltration Sold on Darknet Price per Account Cards are stolen with POS malware Stolen card data is encrypted to avoid detection Traces are removed Offered for sale on cyber crime websites Offer money-back guarantees and customer support Selling for $5 - $50 Paid with Bitcoin or other online currency 11 Payment Card Data and Protected Health Information Security Practices 8/5/2015
12 Exfiltration and Monetizing PII and PHI Stolen PII/PHI are more useful to fraudsters Data Exfiltration Sold on Darknet Price per Account Target phishing, credentials compromised PII/PHI is identified and collected Data is exfiltrated Offered for sale on cyber crime websites Used to correlate compromised identities Can be used to impersonate the victims Selling for $20 - $200 per account Usually higher than payment card accounts Typically more can be done with PHI and PII 12 Payment Card Data and Protected Health Information Security Practices 8/5/2015
13 Dumps, Fullz, and Payment Card Data on the Darknet 13 Payment Card Data and Protected Health Information Security Practices 8/5/2015
14 Breach Impact to Victims Significant impact to victims of payment card fraud and PII/PHI theft Consumer Stolen Actions Possible Consequences Issue New Card Counterfeit Fraud Payment Card Credit Monitoring Fraudulent Prescriptions Contact SSA Stolen Identity PII/PHI File Police Report Fraudulent Loans & Accounts 14 Payment Card Data and Protected Health Information Security Practices 8/5/2015
15 Payment Card Industry (PCI) Data Security Standard (DSS) Health Insurance Portability and Accountability Act (HIPAA) Security
16 Health Insurance Portability and Accountability Act HIPAA Security is one section of the HIPAA Rule 16 Payment Card Data and Protected Health Information Security Practices 8/5/2015
17 Regulatory Requirements for Healthcare Data HIPAA Security Rule (1996) Administrative, Physical, and Technical Safeguards for Protected Health Information (PHI) Goal is to protect the confidentiality, integrity, and availability of PHI Compliance by April 21, 2005 (April 21, 2006 for small health plans) Limited enforcement by U.S. Health and Human Services HITECH Act (2009) Part of the American Recovery and Reinvestment Act (ARRA) of 2009 Accelerate adoption of Electronic Health Records (EHR) New civil penalties for violations Notification requirements for breach reporting Extends requirements to Business Associates Meaningful Use (2010) Incentives for meeting criteria for efficient use of EHRs Improve adoption and interoperability of EHRs Includes 15 core requirements to complete for incentive payments Ensures that Covered Entities must perform risk analysis 17 Payment Card Data and Protected Health Information Security Practices 8/5/2015
18 PCI Security Standards Council (PCI SSC) 1 Industry-wide standards group founded in 2006 Visa, American Express, Discover, JCB and MasterCard 3 PCI DSS applies to any entity that stores, processes, or transmits cardholder data 2 Responsible for development and management of PCI Security Standards PCI DSS, PA-DSS, and PTS 4 Trains and certifies data security companies ASVs, QSAs, PA-QSAs, and PFIs 18 Payment Card Data and Protected Health Information Security Practices 8/5/2015
19 Differences between PCI DSS and HIPAA Security Key differences in security standards Store, process, or transmit payment card data Requires self assessment questionnaire for small merchants QSA or ISA for large merchants Requires vulnerability scanning and pentesting PCI DSS More prescriptive than HIPAA Security Enforced by the card brands Twelve high-level security requirements HIPAA Security Applies to all size Covered Entities Enforced by the Federal Government Administrative, physical and technical safeguards Applies to Covered Entities Penalties can include civil and criminal Required versus addressable Either stored or transmitted Applies to Business Associates Document policies and procedures Allows for compensating controls Reasonable and appropriate safeguards 19 Payment Card Data and Protected Health Information Security Practices 8/5/2015
20 Changes to PCI DSS Versus HIPAA Security Staying ahead latest threats and risks 20 Payment Card Data and Protected Health Information Security Practices 8/5/2015
21 Going Above and Beyond PCI DSS and HIPAA Security
22 Threats and Risks to Payment Card Data and PII/PHI Targeted attacks and growing threats Targeting companies with low security Exploit weaknesses with root kits, POS malware Database stores of payment card data and/or PII/PHI attachments with various exploits Keyloggers used to harvest login credentials Buffer overflows attacks to create backdoors on systems Improve e-commerce security and ensure application security controls are used Merchants accepting mag stripe transactions will be targeted 22 Payment Card Data and Protected Health Information Security Practices 8/5/2015
23 Security Standards Compliance Higher education, hospitals, etc. have multiple regulatory requirements Hospitals have HIPAA, JCAHO, PCI DSS, Sarbanes-Oxley, FDA, etc. Some are challenging environments to assess, multiple locations, stores, parking, kiosks, etc. Validate compliance independently but leverage key activities Executive sponsorship is a must Document all findings especially risk assessment, gap analysis, and key controls 23 Payment Card Data and Protected Health Information Security Practices 8/5/2015
24 Layered Security Approach Policies, Procedures & Training PCI DSS HIPAA Security Other secure technologies EMV chip, tokenization, point-to-point encryption SIEM, WAF, Application whitelisting PCI DSS Vulnerability scanning and penetration testing IDS/IPS, APT threat protection HIPAA Security 24 Payment Card Data and Protected Health Information Security Practices 8/5/2015
25 Maturing Information Security Validate to Version 3.1 After April 2015, all merchants must validate to PCI DSS version 3.1. Version 3.1 continues to evolve the PCI DSS standard controls to address current threats and vulnerabilities. Note the penetration testing requirement (11.3) effective after June 30, Implement P2PE, EMV Chip, and Tokenization EMV Chip - Creates a unique cryptogram for each transaction Tokenization - Token replaces account number with unique digital token P2PE -Encrypt from the point of sale to the point where the third-party payment processor or acquirer decrypts the data for processing Proactive Security Controls Use two-factor authentication especially for remote access File integrity monitoring to protect against malware Application whitelisting to allow only those allowed applications Improve segmentation between CDE and core network Web application firewalls (WAF) Properly segment CDE 25 Payment Card Data and Protected Health Information Security Practices 8/5/2015
26 Additional Security Controls for Large Merchants SIEM Security intelligence and correlation Alerts and notification Tuning Vulnerability Management Frequency of scans Zero day vulnerabilities Remediation and tracking Antivirus Keep signatures updated Ensure settings cannot be altered Patch Management Keep all software, hardware, appliances up to date End of life systems Vulnerability window 26 Payment Card Data and Protected Health Information Security Practices 8/5/2015
27 Examples of Small Merchant Security Safeguards* Ease of Implementation Change Default Passwords Install Antivirus Enable Remote Access Only When Needed Segment Network Conduct Employee Training & Awareness Easy Medium Easy Medium Easy Cost None Medium None Medium Low Effectiveness Medium Medium High High High *Based on PCI Forensic Investigation Reports of Small Merchants 27 Payment Card Data and Protected Health Information Security Practices 8/5/2015
28 Key Takeaways Lessons Learned 1. PII/PHI versus payment card data PII/PHI is typically worth more on the darknet than payment card data 2. Hackers targeting path of least resistance Hackers know companies that have weak or low security controls 3. After liability shift, fraud will migrate to other channels Shift to card not present channels such as e-commerce 4. Devalue the data Make payment card data, PII/PHI unusable to fraudsters when compromised 5. Implement secure technology Consider point-to-point encryption, tokenization, and EMV chip to protect data 6. Go above PCI DSS and HIPAA Security Both security standards are a floor, not ceiling, implement complimentary controls for a layered security approach 28 Payment Card Data and Protected Health Information Security Practices 8/5/2015
29 Visa is hosting a must-attend event that will focus on trends and developments related to cyber security, mobile payments, e-commerce and Visa s global authentication strategy. In order to secure the future of commerce all stakeholders including merchants, acquirers, agents and Visa need to collaborate on key initiatives in addressing today s most relevant issues. This event will be held in the San Francisco Bay Area at the Hyatt Regency Hotel just south of San Francisco. 29 Payment Card Data and Protected Health Information Security Practices 8/5/
30 Upcoming Events and Resources Upcoming Webinars Under Merchant Resources/Training on Implementing Effective Penetration Testing, August 25, 2015 The Importance of Containment and Remediation of Compromised Payment Processing Environments, September 2, 2015 Visa Online Merchant Tool Kit provides helpful information to make a seamless EMV transition Streamline your chip migration Visa Data Security Website Alerts, Bulletins Best Practices, White Papers Webinars PCI Security Standards Council Website Data Security Standards, QIR Listing Fact Sheets Mobile Payments Acceptance, Tokenization, and many more 30 Payment Card Data and Protected Health Information Security Practices 8/5/2015
31 Thank you for attending! Questions? Comments?
Data Security Basics for Small Merchants
Data Security Basics for Small Merchants 28 October 2015 Stan Hui Director, Merchant Risk Lester Chan Director, Merchant Risk Disclaimer The information or recommendations contained herein are provided
Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security
Breach Findings for Large Merchants 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security Disclaimer The information or recommendations contained herein are
Effectively Managing Data Breaches
Effectively Managing Data Breaches May 27, 2015 Stoddard Lambertson Cyber Intelligence and Investigations Justina Jow Cyber Intelligence and Investigations Disclaimer The information or recommendations
2015 Visa Payment Security Symposium Webinar
The Power of Partnership AUGUST 12-13 HYATT REGENCY BURLINGAME, CA 2015 Visa Payment Security Symposium Webinar Diana Greenhaw Sr. Director, Global Data Security and Third Party Risk Lester Chan Director,
Securing The Data. Payment System Forum Bank Negara Malaysia. 27 th November 2014. Murugesh Krishnan Head of Risk, South & Southeast Asia
Securing The Data Payment System Forum Bank Negara Malaysia 27 th November 2014 Murugesh Krishnan Head of Risk, South & Southeast Asia Disclaimer Case studies, statistics, research and recommendations
Third Party Risk Management Basics. Webinar. 26 February 2015
Third Party Risk Management Basics Webinar 26 February 2015 Stan Hui Payment System Security Oscar Munoz Third Party Risk Roxanne Baumann Third Party Risk Disclaimer The information or recommendations
Identifying and Mitigating Threats to E-commerce Payment Processing
Identifying and Mitigating Threats to E-commerce Payment Processing Erik Rasmussen Director, NA Cyber Security Intelligence Visa Inc. 29 April 2015 Disclaimer The information or recommendations contained
MITIGATING LARGE MERCHANT DATA BREACHES
MITIGATING LARGE MERCHANT DATA BREACHES Tia D. Ilori Ed Verdurmen January 2014 1 DISCLAIMER The information or recommendations contained herein are provided "AS IS" and intended for informational purposes
SecurityMetrics Introduction to PCI Compliance
SecurityMetrics Introduction to PCI Compliance Card Data Compromise What is a card data compromise? A card data compromise occurs when payment card information is stolen from a merchant. Some examples
SecurityMetrics. PCI Starter Kit
SecurityMetrics PCI Starter Kit Orbis Payment Services, Inc. 42 Digital Drive, Suite 1 Novato, CA 94949 USA Dear Merchant, Thank you for your interest in Orbis Payment Services as your merchant service
Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013
Encryption and Tokenization: Protecting Customer Data Your Payments Universally Amplified Tia D. Ilori Sue Zloth September 18, 2013 Agenda Global Threat Landscape Real Cost of a Data Breach Evolution of
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.
MasterCard PCI & Site Data Protection (SDP) Program Update Academy of Risk Management Innovate. Collaborate. Educate. The Payment Card Industry Security Standards Council (PCI SSC) Open, Global Forum Founded
Implement Effective Penetration Testing
Implement Effective Penetration Testing Ed Verdurmen Visa - Moderator Navid Jam FireEye Rob Chahin & Kevin Dunn NCC Group Ryan Wakeham & Scott Sutherland netspi August 25, 2015 Notice of Disclaimer The
Payment Card Industry Data Security Standards
Payment Card Industry Data Security Standards Discussion Objectives Agenda Introduction PCI Overview and History The Protiviti Difference Questions and Discussion 2 2014 Protiviti Inc. CONFIDENTIAL: This
Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.
Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History
Webinar - Skimming and Fraud Protection for Petroleum Merchants. November 14 th 2013
Webinar - Skimming and Fraud Protection for Petroleum Merchants November 14 th 2013 Disclaimer The information or recommendations contained herein are provided "AS IS" and intended for informational purposes
PCI Compliance Overview
PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)
PCI DSS Compliance. 2015 Information Pack for Merchants
PCI DSS Compliance 2015 Information Pack for Merchants This pack contains general information regarding PCI DSS compliance and does not take into account your business' particular requirements. ANZ recommends
AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009
AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application
PCI Security Standards Council
PCI Security Standards Council Jeremy King, European Director 2013 Why PCI Matters Applying PCI How You Can Participate Agenda 2 Why PCI Matters Applying PCI How You Can Participate Agenda About the PCI
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics About Us Matt Halbleib CISSP, QSA, PA-QSA Manager PCI-DSS assessments With SecurityMetrics for 6+ years SecurityMetrics Security
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance
Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance March 29, 2012 1:00 p.m. ET If you experience any technical difficulties, please contact 888.228.0988 or [email protected]
Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014
Are You Ready For PCI v 3.0 Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014 Today s Presenter Corbin Del Carlo QSA, PA QSA Director, National Leader PCI Services Practice 847.413.6319
Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director
Thoughts on PCI DSS 3.0 D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director Agenda 1 2 3 Global Payment Card Statistics and Trends PCI DSS Overview PCI DSS Version 3.0: Important Timelines
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
How To Protect Your Business From A Hacker Attack
Payment Card Industry Data Security Standards The payment card industry data security standard PCI DSS Visa and MasterCard have developed the Payment Card Industry Data Security Standard or PCI DSS as
Your Compliance Classification Level and What it Means
General Information What are the Payment Card Industry (PCI) Data Security Standards? The PCI Data Security Standards represents a common set of industry tools and measurements to help ensure the safe
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
How To Protect Your Credit Card Information From Being Stolen
Visa Account Information Security Tool Kit Welcome to the Visa Account Information Security Program 2 Contents 1. Securing cardholder data is everyone s concern 4 2. Visa Account Information Security (AIS)
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
New PCI Standards Enhance Security of Cardholder Data
December 2013 New PCI Standards Enhance Security of Cardholder Data By Angela K. Hipsher, CISA, QSA, Jeff A. Palgon, CPA, CISSP, QSA, and Craig D. Sullivan, CPA, CISA, QSA Payment cards a favorite target
HOW SECURE IS YOUR PAYMENT CARD DATA?
HOW SECURE IS YOUR PAYMENT CARD DATA? October 27, 2011 MOSS ADAMS LLP 1 TODAY S PRESENTERS Francis Tam, CPA, CISA, CISM, CITP, CRISC, PCI QSA Managing Director PCI Practice Leader Kevin Villanueva,, CISSP,
Data Security for the Hospitality
M&T Bank and SecurityMetrics Present: Data Security for the Hospitality Industry Featuring Lee Pierce, SecurityMetricsStrategicStrategic Accounts Dave Ellis, SecurityMetrics Forensic Investigator Doug
PCI DSS Compliance Services January 2016
PCI DSS Compliance Services January 2016 20160104-Galitt-PCI DSS Compliance Services.pptx Agenda 1. Introduction 2. Overview of the PCI DSS standard 3. PCI DSS compliance approach Copyright Galitt 2 Introduction
How To Protect Visa Account Information
Account Information Security Merchant Guide At Visa, protecting our cardholders is at the core of everything we do. One of the many reasons people trust our brand is that we make buying and selling safer
PCI Compliance Top 10 Questions and Answers
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
PCI Compliance: How to ensure customer cardholder data is handled with care
PCI Compliance: How to ensure customer cardholder data is handled with care Choosing a safe payment process for your business Contents Contents 2 Executive Summary 3 PCI compliance and accreditation 4
Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS
The PCI Security Standards Council http://www.pcisecuritystandards.org The OWASP Foundation http://www.owasp.org Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS Omar F. Khandaker,
PCI DSS Overview. By Kishor Vaswani CEO, ControlCase
PCI DSS Overview By Kishor Vaswani CEO, ControlCase Agenda About PCI DSS PCI DSS Applicability to Banks, Merchants and Service Providers PCI DSS Technical Requirements Overview of PCI DSS 3.0 Changes Key
Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :
Data Security & PCI Compliance Securing Your Contact Center Session Name : Title Introducing Trevor Horwitz Pi Principal, i TrustNet t [email protected] John Simpson CIO, Noble Systems Corporation
PCI: It Never Ends. Why?
PCI: It Never Ends. Why? How to stay prepared? Shekar Swamy American Technology Corporation St. Louis, MO January 13, 2011 PCI compliance basics It s all about Data Security 12 major areas of compliance
Project Title slide Project: PCI. Are You At Risk?
Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services
HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS
HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS August 23, 2011 MOSS ADAMS LLP 1 TODAY S PRESENTERS Presenters Francis Tam, CPA, CISA, CISM, CITP, CRISC, PCI QSA Managing Director, IT Security
Josiah Wilkinson Internal Security Assessor. Nationwide
Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges
Visa PIN Security Program Webinar May 2015. Alan Low PIN Risk Representative AP and CEMEA. Visa Public
Visa PIN Security Program Webinar May 2015 Alan Low PIN Risk Representative AP and CEMEA Disclaimer The information or recommendations contained herein are provided "AS IS" and are intended to be information
Adyen PCI DSS 3.0 Compliance Guide
Adyen PCI DSS 3.0 Compliance Guide February 2015 Page 1 2015 Adyen BV www.adyen.com Disclaimer: This document is for guidance purposes only. Adyen does not accept responsibility for any inaccuracies. Merchants
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
So you want to take Credit Cards!
So you want to take Credit Cards! Payment Card Industry - Data Security Standard: (PCI-DSS) Doug Cox GSEC, CPTE, PCI/ISA, MBA [email protected] Data Security Analyst University of Michigan PCI in Higher Ed
The Relationship Between PCI, Encryption and Tokenization: What you need to know
October 2014 The Relationship Between PCI, Encryption and Tokenization: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems,
PCI: The Dark Side. May 2012 Roanoke, VA
PCI: The Dark Side May 2012 Roanoke, VA Agenda The problem Who are they? Why? What do they steal? How do they do it? What can they do with it? How can you stop it? Ron King, Ed Ko, CampusGuard CampusGuard
IT Security Compliance PCI DSS FOR MERCHANTS THE PAYMENT CARD INDUSTRY DATE SECURITY STANDARD WHITE PAPER
July 9 th, 2012 Prepared By: Mark Akins PCI QSA, CISSP, CISA WHITE PAPER IT Security Compliance PCI DSS FOR MERCHANTS THE PAYMENT CARD INDUSTRY DATE SECURITY STANDARD PCI DSS for Merchants The Payment
PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor [email protected] January 23, 2014
PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor [email protected] January 23, 2014 Agenda Introduction PCI DSS 3.0 Changes What Can I Do to Prepare? When Do I Need to be Compliant? Questions
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance
Security & Compliance, Sikich LLP
Mark Shelhart, CFI, CISSP, QSA Security & Compliance, Sikich LLP 1. Credit card breaches 2. Disgruntled IT, bad leaver 3. Personal records breach 4. Vendor network connections (and contracts) 5. Everything
Payment Card Security
Payment Card Security January 31, 2008 Kieran Norton, Senior Manager Security & Privacy Services, Deloitte & Touche LLP Focus of the Presentation PCI Overview Background Current Environment Key Considerations
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008 What is the PCI DSS? And what do the acronyms CISP, SDP, DSOP and DISC stand for? The PCI DSS is a set of comprehensive requirements
Credit Card Processing, Point of Sale, ecommerce
Credit Card Processing, Point of Sale, ecommerce Compliance, Self Auditing, and More John Benson Kurt Willey HACKS REGULATIONS Greater Risk for Merchants Topics Compliance Changes Scans Self Audits
Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)
Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions Version 5.0 (April 2011) Contents Contents...2 Introduction...3 What are the 12 key requirements of
TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business
TAKING OUR CUSTOMERS BUSINESS FORWARD The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment
Information Security Services. Achieving PCI compliance with Dell SecureWorks security services
Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)
Payment Card Industry Compliance Overview
January 31, 2014 11:30am 12:30pm Central Hosted by: Texas.gov Presented by: Jayne Holland Barbara Brinson Payment Card Industry Compliance Overview Securing Government Payments Audio Dial In: 866-740-1260
Need to be PCI DSS compliant and reduce the risk of fraud?
Need to be PCI DSS compliant and reduce the risk of fraud? NCR Security lessens your PCI compliance burden and protects the integrity of your network An NCR White Paper Experience a new world of interaction
Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance
Payment Security White Paper Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance Breaches happen across all industries as thieves look for vulnerabilities.
WHITE PAPER. PCI Basics: What it Takes to Be Compliant
WHITE PAPER PCI Basics: What it Takes to Be Compliant Introduction A long-running worldwide advertising campaign by Visa states that the card is accepted everywhere you want to be. Unfortunately, and through
Property of CampusGuard. Compliance With The PCI DSS
Compliance With The PCI DSS Today s Agenda PCI DSS Introduction How are Colleges and Universities Affected? How Do You Validate Compliance? Best Practices Q&A CampusGuard Full-Service QSA/ASV Firm We Know
Preparing for EMV chip card acceptance
Preparing for EMV chip card acceptance Ben Brown Vice President, Regional Sales Manager, Wells Fargo Merchant Services Lily Page Vice President, Wholesale ereceivables, Wells Fargo Merchant Services June
U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon
U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon UMACHA Navigating Payments 2014 October 8, 2014 Who We Are Claudia
PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES
PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES CUTTING THROUGH THE COMPLEXITY AND CONFUSION Over the years, South African retailers have come under increased pressure to gain PCI DSS (Payment Card Industry
Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards
Westpac Merchant A guide to meeting the new Payment Card Industry Security Standards Contents Introduction 01 What is PCIDSS? 02 Why does it concern you? 02 What benefits will you receive from PCIDSS?
PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS
PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS CIVICA Conference 22 January 2015 WELCOME AND AGENDA Change is here! PCI-DSS 3.0 is mandatory starting January 1, 2015 Goals of the session
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Instructions and Guidelines Version 1.1 February 2008 Table of Contents About this Document... 1 PCI Data Security Standard
Frequently Asked Questions
PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply
Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer
Complying with the PCI DSS All the Moving Parts Don Roeber Vice President, PCI Compliance Manager Lisa Tedeschi Assistant Vice President, Compliance Officer Types of Risk Operational Risk Normal fraud
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
To ensure independence, PSC does not represent, resell or receive commissions from any third party hardware, software or solutions vendors.
About PSC With offices in the USA, Canada, UK and Australia, PSC is a leading PCI, PA DSS, and P2PE assessor, PCI Forensics Company and Approved Scanning Vendor. PSC is one of an elite few companies qualified
