PCI Security Standards Council



Similar documents
PCI Security Standards Council

PCI PA-DSS Requirements. For hardware vendors

The PCI Security Standards Council. Jeremy King European Director

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

Data Security Basics for Small Merchants

Transitioning from PCI DSS 2.0 to 3.1

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

PCI Compliance Overview

The Relationship Between PCI, Encryption and Tokenization: What you need to know

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

PCI Security Standards Council

Payment Card Industry Data Security Standards

So you want to take Credit Cards!

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

Payment Card Industry (PCI) Additional Security Requirements for Token Service Providers (EMV Payment Tokens)

University Policy Accepting Credit Cards to Conduct University Business

Payment Card Industry (PCI) Data Security Standard

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

Payment Card Industry (PCI) Data Security Standard

Third Party Risk Management Basics. Webinar. 26 February 2015

Credit Card Processing, Point of Sale, ecommerce

Why Is Compliance with PCI DSS Important?

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1

To ensure independence, PSC does not represent, resell or receive commissions from any third party hardware, software or solutions vendors.

Becoming PCI Compliant

Payment Card Industry (PCI) Data Security Standard

PCI and EMV Compliance Checkup

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

Payment Card Industry (PCI) Data Security Standard

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

PCI DSS Compliance Information Pack for Merchants

Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance

Payment Card Industry Compliance Overview

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

PCI DSS. CollectorSolutions, Incorporated

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

HOW SECURE IS YOUR PAYMENT CARD DATA?

Payment Card Industry (PCI) Point-to-Point Encryption

White Paper Solutions For Hospitality

PCI COMPLIANCE AND WHAT IT MEANS TO YOU IN ENGLISH

Meet The Family. Payment Security Standards

PCI Compliance. Crissy Sampier, Longwood University Edward Ko, CampusGuard

Payment Application Data Security Standard

Payment Card Industry (PCI) Point-to-Point Encryption

PCI Compliance for Healthcare

Credit Card Processing Overview

Section 1: Assessment Information

Payment Card Industry (PCI) Terminal Software Security. Best Practices

Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director

PCI DSS Compliance Services January 2016

Project Title slide Project: PCI. Are You At Risk?

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

Prevention Is Better Than Cure EMV and PCI

Introduction to PCI DSS

PCI P2PE 2.0. What Does it Mean for Merchants and Processors? September 10, 2015

Payment Card Industry (PCI) Data Security Standard QSA Validation Requirements. Supplement for PCI Forensic Investigators (PFIs)

Mobile Device Payment Card Processing: How Secure is It? Richard Poworski CISSP, ISP, ITCP, SCF, PCI QSA, PCIP Managing Consultant

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

Payment Card Industry Data Security Standard (PCI DSS)

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

Effectively Managing Data Breaches

Understanding the SAQs for PCI DSS version 3

CardControl. Credit Card Processing 101. Overview. Contents

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

Attestation of Compliance for Onsite Assessments Service Providers

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

Security. Tiffany Trent-Abram VP, Global Product Management. November 6 th, One Connection - A World of Opportunities

PAYMENT SECURITY. Best Practices

Security & Encryption in Healthcare Payments PCI DSS Technical Assessment White Paper

Thoughts on PCI DSS 3.0. September, 2014

Payment Card Industry (PCI) Data Security Standard

Qualified Integrators and Resellers (QIR) Implementation Statement

PCI DSS Gap Analysis Briefing

Adyen PCI DSS 3.0 Compliance Guide

Need to be PCI DSS compliant and reduce the risk of fraud?

Transcription:

PCI Security Standards Council Bob Russo, General Manager 2013

Why PCI Matters Applying PCI How You Can Participate Agenda

About the PCI Council Open, global forum Founded 2006 Guiding open standards for payment card security Development Management Education Awareness

Business Sectors With the Most Breaches Systems that store, process or transmit cardholder data remain primary targets for criminals Retail 45% Food & Beverage 24% Hospitality 9% Other 8% Financial Services 7% Nonprofit 3% Health & Beauty 2% High Technology 2% Source: Trustwave 2013 Global Security Report

Top Mistakes By Those Breached Revealed by Forensic Audits Weak Passwords Lack of employee education Security deficiencies introduced by third parties responsible for system support, development and/or maintenance Slow self-detection Source: Trustwave 2013 Global Security Report

PCI Standards Help Secure Your Data 92% of compromises were simple 97% were avoidable through simple or intermediate controls 92% 97% Source: Verizon 2012 Data Breach Investigations Report

PCI Security Standards Suite Protection of Cardholder Payment Data Manufacturers PCI PTS Pin Entry Devices Software Developers PCI PA-DSS Payment Applications Merchants & Service Providers PCI DSS Secure Environments PCI Security & Compliance P2PE Ecosystem of payment devices, applications, infrastructure and users

Getting Ready for PCI 3.0 2013 Focus: Updating PCI Standards and supporting documents based on Community feedback

PTS POI 4.0 May 2013 Key Changes Security policy Device implementation documentation Restructure open protocols module Enhanced interface testing Added source code reviews Open source code reviews

Card Production Requirements May 2013 Physical Personnel Vendor Premises Production Procedures and Audit Trails Product Storage and Shipping Procedures 10

Card Production Requirements Logical Typical Vendor Network Private Network (Leased lines) Vendor Controlled Issuer/ Data Source Internet Internet Facing Network Data Processing Network Perso Network POTS 11

Why PCI Matters Applying PCI How You Can Participate Applying PCI

Applying PCI in Your Environment Mobile P2PE Virtualization ATM Tokenization Cloud EMV

EMV Chip Helps Reduce Face-to-Face Fraud EMV chip by itself does not protect the confidentiality of, or inappropriate access to sensitive authentication data and/or cardholder data in card-not-present or Internet transactions

Even EMV Chip Security Needs PCI

Understanding Mobile Payments Making Payments Accepting Payments Applications

PCI on Mobile Payment Acceptance Security Identified mobile applications that can be validated to PA-DSS Published merchant guidance for mobile solutions leveraging P2PE Developed best practices for developers New merchant guidelines

Areas of Focus for Mobile MOBILE Devices Tamper-responsive, PTS Devices (e.g. SCR) using P2PE Applications Requirements and/or Best Practices for authorization and settlement Service Providers Service provider protection of cardholder data and validation

Guidance on Mobile Payment Acceptance Security

New Merchant Guidelines For Merchants as End-Users Objectives and guidance for the security of a payment transaction Guidelines for securing the mobile device Guidelines for securing the payment acceptance solution

Point-to-Point Encryption Point-to-Point Encryption Available to all members of the payment chain Also called P2PE Optional standard for decreasing scope PCI 2PE hardware /hardware requirements available PCI P2PE Hybrid requirements available

Tokenization Work on tokenization standards has begun PAN Ensure that process of creating token from PAN doesn t leak information about PAN Ensure that a token or collection of tokens by themselves cannot feasibly allow discovery of PAN Ensure that adequate controls exist over detokenization process T Token Ensure that token cannot be used in lieu of PAN for impermissible purposes

ATM Security Best Practices ATM Best Practices for development, deployment and management of ATMs Target Audience ATM manufacturers Integrators Deployers of ATMs

Special Interest Group (SIG) Guidance E-commerce Security Risk Assessment Cloud Computing Awareness of specific risks and considerations Guidance on how to determine what these might mean for your particular environment Recommendations and best practices for PCI DSS Go to our website today to download these new guidelines! https://www.pcisecuritystandards.org/index.php

The Formula for Payment Security Success People + Processes + Technology = Security

Why PCI Matters Applying PCI How You Can Participate How You Can Participate

2013 Training Highlights Online Internal Security Assessor (ISA) Training P2PE Assessor Training Corporate PCI Awareness Let Us Come To You! Online Awareness Training in Four Hours Qualified Integrators and Resellers (QIR) Program PCI Professional Program (PCIP) To learn more, visit: www.pcisecuritystandards.org/ training/index.php

Qualified Integrators & Resellers Program Addresses common merchant misconceptions: I m using a PA-DSS validated application, so I must be OK. I m using a reputable 3 rd party, so they must be doing a secure installation. This applies only to brick and mortar establishments.

Payment Card Industry Professional (PCIP) Support your organization Professional credibility Competitive advantage Global directory Now Available

Internal Security Assessor (ISA) Program A comprehensive PCI DSS training and qualification program for eligible internal audit security professionals that you asked for! Improves your understanding of PCI DSS and compliance procedures Helps your organization build internal expertise Teaches processes that can reduce the cost of compliance

Be Involved Contribute Your Expertise! Chief Security Officers IT Managers Information Security Professionals Risk Managers Compliance Officers Join! Become a Participating Organization today Chief Information Officers Forensic Investigators Legal Experts Technologists Data Security Experts

Help Participate in Standards Development Implementation Feedback Formal Feedback Draft Revisions Feedback

2013 Special Interest Groups- Join us! Best Practices for Maintaining PCI Compliance Third Party Security Assurance Visit PCI SSC website to sign up

Get Involved We Need Your Input Join Learn Input Network Nominate Vote Share Influence

Security Compliance vs. Compliance Doesn t Equal Security

Questions? Please visit our website at www.pcisecuritystandards.org