Mitigating Card System Breaches. October 11, 2015 2:00 pm 2:50 pm



Similar documents
How To Plan For A Mobile Payment System

MEASURING YOUR PEOPLE. October 12, :00 am 8:50 am

Payment Technology Deep Dive. October 13, :00 am 8:50 am

Achieving Certified PCI Compliance? Tuesday, May 6, 2008

ICS Presents: The October 1st 2015 Credit Card Liability Shift: This Impacts Everyone!

Project Title slide Project: PCI. Are You At Risk?

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

Introduction to PCI DSS Compliance. May 18, :15 p.m. 2:15 p.m.

Data Security Basics for Small Merchants

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Why Is Compliance with PCI DSS Important?

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Securing The Data. Payment System Forum Bank Negara Malaysia. 27 th November Murugesh Krishnan Head of Risk, South & Southeast Asia

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

Franchise Data Compromise Trends and Cardholder. December, 2010

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

Network Segmentation. June 30, :00 Noon Eastern

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Simphony v2 Antivirus Recommendations

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

MITIGATING LARGE MERCHANT DATA BREACHES

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

Ruby VASC Instructor Guide

Frequently Asked Questions

Webinar - Skimming and Fraud Protection for Petroleum Merchants. November 14 th 2013

University of Virginia Credit Card Requirements

Client Security Risk Assessment Questionnaire

Reference Architecture: Enterprise Security For The Cloud

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Introduction to. May 18, :15 p.m. 2:15 p.m.

PCI DSS Security Awareness Training for University of Tennessee Credit Card Merchants. UT System Administration Information Security Office

PCI Compliance Top 10 Questions and Answers

Data Security, Fraud Prevention, and Cost Control. Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association

PCI DSS Compliance What Texas BUC$ Need to Know! Ron King CampusGuard

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards

SecurityMetrics Introduction to PCI Compliance

Global Partner Management Notice

Privilege Gone Wild: The State of Privileged Account Management in 2015

Guide to Remote Access Management

How To Protect Your Data From Being Stolen

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

A Systems Approach to HVAC Contractor Security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Two Approaches to PCI-DSS Compliance

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

The Petroleum Marketer s PCI compliance Reference Guide

Privilege Gone Wild: The State of Privileged Account Management in 2015

Mobile Device Payment Card Processing: How Secure is It? Richard Poworski CISSP, ISP, ITCP, SCF, PCI QSA, PCIP Managing Consultant

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

SECURING YOUR REMOTE DESKTOP CONNECTION

Sage 100 ERP I White Paper. Payment Processing Trends, Tips, and Tricks: What You Need to Know

PCI Compliance. Top 10 Questions & Answers

Sage ERP MAS I White Paper. Payment Processing Trends, Tips, and Tricks: What You Need to Know

Property of CampusGuard. Compliance With The PCI DSS

Xerox Mobile Print Cloud

Table of Contents. 2 TouchSuite Welcome Kit

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

PCI Compliance Overview

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

PCI DSS COMPLIANCE DATA

V ISA SECURITY ALERT 13 November 2015

PCI DSS Compliance Information Pack for Merchants

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

RedBlack CyBake Online Customer Service Desk

A Whitepaper by Vesta Corporation. Payment Card Industry Data Security Standards (PCI DSS) and Mobile Operators: Trends and Implications

How To Protect Your Business From A Hacker Attack

How To Control Credit Card And Debit Card Payments In Wisconsin

What does it mean to be secure?

Security & Compliance, Sikich LLP

Qualified Integrators and Resellers (QIR) Implementation Statement

PCI Requirements Coverage Summary Table

PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES

Third Party Risk Management Basics. Webinar. 26 February 2015

How to complete the Secure Internet Site Declaration (SISD) form

Simplêfy Client Support and Information Services. PCI Compliance Guidebook

The Business Case for Security Information Management

Payment Card Industry Compliance Overview

PCI Compliance at The University of South Carolina. Failure is not an option. Rick Lambert PMP University of South Carolina

Transcription:

Mitigating Card System Breaches October 11, 2015 2:00 pm 2:50 pm

Direct Costs of a Data Breach

Indirect Costs of a Data Breach

Objectives Technology arm of NACS Volunteers do the heavy lifting Create technology standards Educate Advocate NACS partner in Technology Edge at the Show Technology Edge Solution Center (Booth 5709)

Moderator Linda Toth Director of Standards Conexxus Speakers Kara Gunderson POS Manager Citgo Petroleum Corporation Phil Schwartz IS Manager, Credit Card Systems POS App Support Valero Energy Corporation

Objectives Objectives Define security versus compliance as it pertains to your organization s data security Identify the resources available today to help you secure your sensitive data Connect with resources that can provide you with additional information on data security

What we are going to discuss Difference between Security vs. Compliance Anti-skimming Risk Mitigation Plan Conexxus Security Incident Reporting Tool Q & A

Are you PCI compliant today? A. Yes B. No C. Not sure

Don t concentrate on the finger

What is the most frequently used method of data theft in the convenience retail channel? A. RAM skimming B. AFD skimming C. Remote access infiltration D. SQL injection

Skimming Devices

How many of the previously pictured devices are skimmers? A. One B. Two C. All three D. None

Skimming Devices

Tamper-proof Stickers

Replace Standard Locks

Inspect Dispensers Regularly

NACS / Conexxus We Care Program

Start with a PA-DSS Point of Sale

PCI Terminology PA-DSS = Point of Sale Developers Payment Application Data Security Standard PCI-DSS = Merchants Payment Card Industry Data Security Standard

Keep your payment application patched

Are you running the most current version of your payment application? A. Yes B. No C. Don t know

Internet access? Back Office PC Fuel Dispensers Video Surveillance Point of Sale

Install a firewall

Firewall installation Back Office PC & Surveillance Cardholder Data FIREWALL with Segmentation

Use two-factor authentication

Passwords

Do you have a schedule for changing all passwords on your retail systems?

Anti-virus

White Listing ONLY ALLOW THESE WEBSITES or IP ADDRESSES Managed Firewall Service Provider Help Desk Point of Sale Vendor Help Desk Fuel Dispenser Manufacturer Help Desk Underground Tank Storage Monitoring Service Video Surveillance Company Back Office Accounting Software Help Desk Use Managed Firewall Service Provider or IT person to set up White List

New/Upgraded POS = IP Based DIRECT CONNECTION Install Managed Firewall Service & Anti-Virus Software Inspect Fuel Dispensers Daily

Pen Testing

Has an external vulnerability scan been performed at your sites this year?

Data Security Incident Report Database Developed by the Conexxus Data Security Standards Committee Complete Anonymous No IP tracking Single Username and Password

Incident tracking

Key takeaways Compliance is required Security should be your focus There are some simple steps that you can take to enhance security of sensitive customer data You are not alone

Available resources NACS We Care Anti-Skimming Video: http://www.nacsonline.com/solutions/finance-operations/pages/wecare.aspx NACS We Care Security Stickers: http://tydenbrooks.com/seals-bytype/security-tape-labels/gas-pump-tamper-evident-labels Conexxus-NACS We Care Program: http://www.conexxus.org/content/conexxus-resources NACS - www.nacsonline.com PCI Compliance Information: www.pcisecuritystandards.org

Objectives Technology Edge Solution Center (Booth 5709) Website: www.conexxus.org Email: info@conexxus.org LinkedIn Group: Conexxus Online Follow us on Twitter: @Conexxusonline

Session Survey Question #1 I would recommend this session to my peers. ( Swipe your rating on your phone or tablet) Please complete the three survey questions if you wish to receive the presentation

Session Survey Question #2 I can apply the content from this session in my job. ( Swipe your rating on your phone or tablet) Please complete the three survey questions if you wish to receive the presentation

Session Survey Question #3 Please share what you liked most or least about this session as well as future topics for education sessions (Type your response in the text field. The last edit is your final submission) Please complete the three survey questions if you wish to receive the presentation

Copyright Notice The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproduction of copyrighted material. Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specified conditions is that the photocopy or reproduction is not to be "used for other purpose than private study, scholarship or research." If a user makes a request for, or lateruses, a photocopy or reproduction for purposes in excess of "fair use," that person may be liable for copyright infringement. Disclaimer The opinions of the contributors expressed herein do not necessarily state or reflect those of the National Association of Convenience Stores. Reference herein to any specific commercial products, process, or service by trade name, trademark manufacturer, or otherwise, shall not constitute or imply an endorsement, recommendation, or support by the National Association of Convenience Stores. The National Association of Convenience Stores makes no warranty, express or implied, nor does it assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product, or process described in these materials.