Mobile Device Payment Card Processing: How Secure is It? Richard Poworski CISSP, ISP, ITCP, SCF, PCI QSA, PCIP Managing Consultant



Similar documents
Protecting Your Customers' Card Data. Presented By: Oliver Pinson-Roxburgh

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Project Title slide Project: PCI. Are You At Risk?

Payment Card Industry Compliance Overview

Property of CampusGuard. Compliance With The PCI DSS

PCI Compliance at The University of South Carolina. Failure is not an option. Rick Lambert PMP University of South Carolina

PCI DSS. CollectorSolutions, Incorporated

SecurityMetrics Introduction to PCI Compliance

PCI Compliance Overview

Data Security Basics for Small Merchants

PCI Compliance. Top 10 Questions & Answers

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

PCI DSS Compliance Information Pack for Merchants

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

Merchant guide to PCI DSS

How To Ensure Account Information Security

PCI Compliance Top 10 Questions and Answers

PCI DSS Gap Analysis Briefing

Payment Card Industry - Achieving PCI Compliance Steps Steps

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

How To Protect Visa Account Information

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

PCI DSS. Payment Card Industry Data Security Standard.

A PCI Journey with Wichita State University

An article on PCI Compliance for the Not-For-Profit Sector

Payment Card Industry Data Security Standard

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

PCI Compliance: How to ensure customer cardholder data is handled with care

Two Approaches to PCI-DSS Compliance

Transitioning from PCI DSS 2.0 to 3.1

It is important to note, the payment brands and acquirers are responsible for enforcing compliance, not the PCI council.

PCI Compliance. Crissy Sampier, Longwood University Edward Ko, CampusGuard

A Compliance Overview for the Payment Card Industry (PCI)

PAI Secure Program Guide

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

Frequently Asked Questions

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

FREQUENTLY ASKED QUESTIONS The MasterCard Site Data Protection (SDP) Program

Adyen PCI DSS 3.0 Compliance Guide

How To Protect Your Credit Card Information From Being Stolen

PCI DSS COMPLIANCE DATA

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Introduction to PCI DSS

VISA EUROPE ACCOUNT INFORMATION SECURITY (AIS) PROGRAMME FREQUENTLY ASKED QUESTIONS (FAQS)

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)

2015 PCI DSS Meeting. OSU Business Affairs Projects, Improvement, and Technology (PIT) Robin Whitlock

PCI COMPLIANCE FOR HIGHER EDUCATION BEST PRACTICES CHECKLIST. Presented By: The Treasury Institute for Higher Education.

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

Data Security Standard (DSS) Compliance. SIFMA June 13, 2012

SecurityMetrics. PCI Starter Kit

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

The Relationship Between PCI, Encryption and Tokenization: What you need to know

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

Brown Smith Wallace, LLC

How To Protect Your Business From A Hacker Attack

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

HOW SECURE IS YOUR PAYMENT CARD DATA?

The PCI DSS Compliance Guide For Small Business

Varonis Systems & The Payment Card Industry Data Security Standard (PCI DSS)

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

What a Processor Needs from a University to Validate Compliance

* Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level.

PCI DSS Compliance Services January 2016

Understanding and Managing PCI DSS

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

White Paper September 2013 By Peer1 and CompliancePoint PCI DSS Compliance Clarity Out of Complexity

Payment Card Industry Data Security Standards

PCI: The Dark Side. May 2012 Roanoke, VA

FREQUENTLY ASKED QUESTIONS The MasterCard Site Data Protection (SDP) Program

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to:

PROTECTION OF OUR MERCHANTS AND REFERRAL PARTNERS IS OUR FIRST CONCERN

PCI Requirements Coverage Summary Table

So you want to take Credit Cards!

Transcription:

Seccuris is Canada s premier Information Assurance integrator. We enable organizations to achieve business goals through effective management of information risk. We are agile, innovative, flexible, and responsive. We assist your organization in managing all aspects of information risk. We specialize in end-to-end services, comprehensive solutions, and tailored programs.

Mobile Device Payment Card Processing: How Secure is It? Richard Poworski CISSP, ISP, ITCP, SCF, PCI QSA, PCIP Managing Consultant

About Seccuris Established in 1999 Dedicated to information assurance consulting, services, and solutions Headquartered in Canada (with offices across Canada) USA headquarters in Dallas, TX; office in Austin, TX Approximately 100 staff and growing Unsurpassed depth in information assurance including security, privacy, and risk management with broad industry expertise 4

Research & Development Education & Training Managed Security Services Information Security Consulting

Mobile Device Payment Card Processing: How Secure is It? The standard, preliminary PCI QSA answer: It all depends. 6

Agenda 1. Differences between current and mobile processing 2. Challenges of using mobile devices for payment cards 3. Meeting the challenges 4. Resources available 5. Q&A 7

Current Processing vs. Mobile Processing 8

Current versus Mobile What are the Differences? Current: POS devices/pin pads Custom applications Payment Application Data Security Standard (PA-DSS) applications Web interfaces Usually within the confines of a business 9

Current versus Mobile Mobile: PIN pads Smartphones Tablets Reader attached to customer PC Can be anywhere! 10

Mobile Payment Devices 11

Mobile Device Payment Challenges 12

Mobile Device Payment Challenges Some of the Challenges in using Mobile Payment Card Industry Data Security Standard (PCI DSS) requirements Multiple options and form factors Maturity Attacker focus 13

Payment Card Industry Data Security Standard Requirements 14

PCI DSS What is the PCI DSS? One worldwide standard, introduced in 2005 All companies are now required to be compliant to do business PCI DSS does not supersede local or regional laws, government regulations, or other legal requirements 6 goals and 12 high level requirements 15

Ecosystem, Roles, and Responsibilities PCI QSA PCI PA QSA PCI ASV PCI ISA 16

PCI DSS Where do the Requirements Apply? Requirements apply to wherever the primary account number (PAN) is stored, processed, or transmitted The Cardholder Data Environment Comprises people, processes, and technology that store, process, or transmit cardholder or sensitive authentication data The PCI DSS security requirements apply to all system components In the context of PCI DSS, system components are any network component, server, or application including in, or connected to, the cardholder data environment 17

PCI DSS Why Comply? Security threats are rising PCI compliance helps to protect: Cardholder data Your network Your customers Your business Merchants and service providers that do not comply with PCI face penalties in the event of a breach, along with non-compliance fees that could affect their bottom line 18

PCI DSS Merchants and service providers that do not comply with PCI face penalties in the event of a breach and non-compliance fees that could affect their bottom line Fines of up to $500,000 per incident Restrictions imposed on the merchant or service provider Monthly fines Higher processing fees Remediation costs (estimated at $90-$302 per record) Potential customer lawsuits Damage to company reputation and brand Forensic investigation costs can be up to $600/hour Forensic teams from each of the payment brands Breached company pays the tab 19

PCI DSS Benefits of Compliance Protect cardholder/sensitive data Prevent (reduce) identity theft Gain competitive advantage through validated compliance; increased revenues Streamline business processes Maintain positive consumer image Ensure confidence in the payment card industry Limit or reduce risk 20

Various Options and Form Factors 21

Mobile Device Options Categories App on PTS-approved mobile device Bundled Consumer handheld device 22

Mobile Device Options Category One App on PTS-approved mobile device 23

Mobile Device Options Category Two Bundled 24

Mobile Device Options Category Three Consumer handheld devices 25

Maturity 26

Mobile Device Challenges Maturity New application space Multiple platforms to support Lack of focus on security on devices 27

How to Prove Compliance 1. Determine scope of Cardholder Data Environment 2. Assess environment according to applicable PCI DSS requirements: Self-Assessment Questionnaire (SAQ); self-guided and/or Qualified Security Assessor assisted Report on Compliance (ROC); Level 1 Merchant or Service Provider 3. Repeat 28

Attacker Focus 29

Mobile Device Challenges Attacker Focus Attackers go where there is the most opportunity Greatest volume of transactions Greatest number of vulnerabilities Greatest exposure of victims 30

Meeting the Challenges 31

Mobile Device Challenges Some Challenges of Using Mobile PCI DSS requirements Multiple options and form factors Maturity Attacker focus 32

Meeting the PCI DSS Requirements Challenge Determine PCI Status Understand the current payment card processing environment. Are you currently compliant with the PCI DSS? What are your current payment channels? How will they change? Understand the PAN usage. Are the current applications being used also available for mobile devices? Use the PCI Security Standards Council s website for approved applications and devices. Talk to your acquirer/bank. Engage a QSA company. 33

Meeting the Multiple Options/Form Factor Challenge Understand what is currently approved for use in the company Get involved with the changes from the start Ask the tough questions Review what others in your industry are doing Determine the level of control required Determine whether the devices will be personal or corporate Work with IT 34

Meeting the Maturity Challenge Determine the risk that the company is willing to accept Acquirer(s)/bank(s) recommendations Due diligence for options Develop detailed requirements to access options 35

Meeting the Attacker Focus Challenge Work with solution vendors to identify associated risks Work with IT people to get their input from the start Acknowledge that attacks can come from internal and external sources Keep current with global events Keep current with industry events Continue networking Think like an attacker Don t forget about the non-mobile environment 36

Available Resources 37

Resources Acquirers/Banks PCI Security Standards Council website FAQs Qualified Security Assessors Approved payment applications and devices Qualified Security Assessor companies 38

Mobile Device Payment Card Processing: How Secure is It? Answer 39

It All Depends. on the following: Due diligence Enterprise fit Effort of nefarious individuals 40

Thank You. Any Questions? Richard Poworski, CISSP, ISP, ITCP, SCF, PCI QSA, PCIP (512) 987-9888 / rpoworski@seccuris.com