2015 Visa Payment Security Symposium Webinar



Similar documents
Effectively Managing Data Breaches

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Data Security Basics for Small Merchants

Securing The Data. Payment System Forum Bank Negara Malaysia. 27 th November Murugesh Krishnan Head of Risk, South & Southeast Asia

Payment Card Data and Protected Health Information Security Practices

Third Party Risk Management Basics. Webinar. 26 February 2015

Implement Effective Penetration Testing

Webinar - Skimming and Fraud Protection for Petroleum Merchants. November 14 th 2013

MITIGATING LARGE MERCHANT DATA BREACHES

Identifying and Mitigating Threats to E-commerce Payment Processing

Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc.

Franchise Data Compromise Trends and Cardholder. December, 2010

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

PCI Compliance Overview

Visa PIN Security Program Webinar May Alan Low PIN Risk Representative AP and CEMEA. Visa Public

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

OpenEdge Research & Development Group April 2015

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Preparing for EMV chip card acceptance

EMV and Restaurants What you need to know! November 19, 2014

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

How To Protect Your Credit Card Information From Being Stolen

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

PCI Security Standards Council

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

White Paper: Are there Payment Threats Lurking in Your Hospital?

Your Reference Guide to EMV Integration: Understanding the Liability Shift

EMV and Restaurants: What you need to know. Mike English. October Executive Director, Product Development Heartland Payment Systems

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance

What is EMV? What is different?

How To Protect Visa Account Information

mobile payment acceptance Solutions Visa security best practices version 3.0

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

Visa global Compromised Account

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper Executive Director, Product Development

Answering your cybersecurity questions The need for continued action

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015

EMV and Small Merchants:

Card Not Present Fraud Webinar Transcript

Authentication Strategy: Balancing Security and Convenience

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Payments Transformation - EMV comes to the US

How To Implement Data Loss Prevention

New PCI Standards Enhance Security of Cardholder Data

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Transitions in Payments: PCI Compliance, EMV & True Transactions Security

PCI DSS Overview and Solutions. Anwar McEntee

Solving the Security Puzzle

Western Australian Auditor General s Report. Information Systems Audit Report

Global Bank Achieves Significant Savings and Increased Transaction Volume with Zero-Touch Authentication

Testimony of Scott Talbott, Sr. V.P. for Government Relations, Electronic Transactions Association (ETA)

Data Breach Response Planning: Laying the Right Foundation

EMV Delivery of Mobile, Parking and Unattended Payments. Elavon

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants

GEOSURE PROTECTION PLAN

How To Protect Your Business From A Hacker Attack

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Payment Card Security

ICS Presents: The October 1st 2015 Credit Card Liability Shift: This Impacts Everyone!

An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter

Credit Card Processing Overview

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

Payment Technology Deep Dive. October 13, :00 am 8:50 am

Privilege Gone Wild: The State of Privileged Account Management in 2015

Card Account means your Card account that is in relation to your Visa Wallet maintained and operated by Tune Money Sdn Bhd.

Transcription:

The Power of Partnership AUGUST 12-13 HYATT REGENCY BURLINGAME, CA 2015 Visa Payment Security Symposium Webinar Diana Greenhaw Sr. Director, Global Data Security and Third Party Risk Lester Chan Director, North America Merchant Security

Forward-Looking Statements The materials, presentations and discussions during this meeting contain forward-looking statements within the meaning of the U.S. Private Securities Litigation Reform Act of 1995. These statements can be identified by the terms will, new, "continue," "could," accelerate, and other similar references to the future. Examples of such forward-looking statements may include, but are not limited to, statements we make about our plans and goals regarding authentication, risk and fraud, the effect of developments in regulatory environment, and other developments in electronic payments. By their nature, forward-looking statements: (i) speak only as of the date they are made, (ii) are neither statements of historical fact nor guarantees of future performance and (iii) are subject to risks, uncertainties, assumptions and changes in circumstances that are difficult to predict or quantify. Therefore, actual results could differ materially and adversely from those forward-looking statements because of a variety of factors, including the following: the impact of regulation, including its effect on issuer and retailer practices and product categories, and the adoption of similar and related laws and regulations elsewhere; developments in current or future disputes macroeconomic and industry factors such as: global economic, political, health and other conditions; competitive pressure on customer pricing and in the payments industry generally; material changes in our customers' performance compared to our estimates; and disintermediation from the payments value stream through government actions or bilateral agreements; systemic developments, such as: disruption of our transaction processing systems or the inability to process transactions efficiently; account data breaches involving card data stored by us or third parties; increased fraudulent and other illegal activity involving our cards; failure to maintain interoperability between our and Visa Europe's authorization and clearing and settlement systems; loss of organizational effectiveness or key employees; and the other factors discussed under the heading "Risk Factors" herein and in our most recent Annual Report on Form 10-K and our most recent Quarterly Reports on Form 10-Q. You should not place undue reliance on such statements. Unless required to do so by law, we do not intend to update or revise any forward-looking statement, because of new information or future developments or otherwise.

Notice of Disclaimer The information, recommendations or best practices contained herein are provided "AS IS" and intended for informational purposes only and should not be relied upon for operational, marketing, legal, technical, tax, financial or other advice. When implementing any new strategy or practice, you should consult with your legal counsel to determine what laws and regulations may apply to your specific circumstances. The actual costs, savings and benefits of any recommendations, programs or best practices may vary based upon your specific business needs and program requirements. By their nature, recommendations are not guarantees of future performance or results and are subject to risks, uncertainties and assumptions that are difficult to predict or quantify. Assumptions were made by us in light of our experience and our perceptions of historical trends, current conditions and expected future developments and other factors that we believe are appropriate under the circumstance. Recommendations are subject to risks and uncertainties, which may cause actual and future results and trends to differ materially from the assumptions or recommendations. Visa is not responsible for your use of the information contained herein (including errors, omissions, inaccuracy or non-timeliness of any kind) or any assumptions or conclusions you might draw from its use. Visa makes no warranty, express or implied, and explicitly disclaims the warranties of merchantability and fitness for a particular purpose, any warranty of non-infringement of any third party's intellectual property rights, any warranty that the information will meet the requirements of a client, or any warranty that the information is updated and will be error free. To the extent permitted by applicable law, Visa shall not be liable to a client or any third party for any damages under any theory of law, including, without limitation, any special, consequential, incidental or punitive damages, nor any damages for loss of business profits, business interruption, loss of business information, or other monetary loss, even if advised of the possibility of such damages.

Day 1 General Session Diana Greenhaw Sr. Director, Global Data Security and Third Party Risk

Event Summary Almost 400 participants from processors, third party agents, acquirers, merchants and event sponsors More than 40 industry expert panelists and speakers, including: Ellen Richey, Vice Chairman Risk and Public Policy, Visa Inc. Mahesh Aditya, Chief Risk Officer, Visa Inc. Jim McCarthy, Executive Vice President Innovation and Strategic Partnerships, Visa Inc. Nine sponsors 5

The Power of Partnership: Securing the Future of Commerce Together Partners play a strategic role in securing the payment system Increasing involvement of non-traditional stakeholders and emerging technology organizations in payments Critical to maintain trust while extending payment environment and incorporating innovation No one can do it alone! 6

After the Compromise: Lessons Learned Communication at all levels is key to successful incident management and resolution Organizations must understand the difference between the annual PCI DSS validation exercise and maintaining ongoing enterprise-wide data security Information sharing on cyber threats and compromise trends are critical to effective data protection You do not want to go through a compromise! 7

Managing Risk with Secure Technology The future of payment system security is data devaluation Several technologies include inherent security features: EMV Chip Point-to-Point Encryption Tokenization Organizations must use the solution that works best for their environment and understand how the technologies work together to create layers of security As emerging technologies continue to enter the payment environment, a key to success is the balance of innovation, convenience and security 8

U.S. EMV Migration Update U.S. EMV counterfeit liability shift October 2015 Liability shift date is not the finish line, but a starting point Multi-layered security approach provides best protection payment system stakeholders and downstream customers 117 Million EMV Chip Cards Issued o 78.1 Million Credit Cards o 39 Million Debit Cards 247,000 Activated EMV Terminals Sources: Current cards based on MARS data through June 30, 2015; credit / debit card forecast per Aite Report EMV: Lessons Learned and the U.S. Outlook (June 2014); activated terminal forecast per Payment Security Taskforce Acquirer projections press release (October 2014) ¹Forecast based on information currently available to Visa. Actual results may vary significantly. 9

Cyber Security Threats and Mitigation Strategies Security Metrics performed a live hacking demonstration illustrating how quickly hackers can access insecure systems to obtain cardholder data Criminals are shifting their attack methods and targets the path of least resistance may not be where you think it is Information sharing between industry participants and law enforcement agencies will be key to combatting this type of crime 10

Data Security Regulatory Activity is Increasing In 2013, President Obama issued an Executive order directing the federal government to take steps to protect the nation s critical infrastructure from cyber threats In 2015, the FFIEC issued its cybersecurity assessment tool to aid financial institutions in evaluating their cyber risk and risk management capabilities The focus in the Senate has been on the Cybersecurity Information Sharing Act of 2015 A number of individual states are amending security breach notice statutes State attorneys general continue to play a significant role on data security issues and breach incidents Specifically, a large number are actively investigating various breach incidents that have occurred in the past two years 11

Day 2 Breakout Sessions Lester Chan Director, North America Merchant Security

Malware POS Session Recap How POS Malware continues to proliferate and evolve with Palo Alto Networks Malware continues to be play a significant role in payment card breaches Four different malware type: file scraper, network sniffer, keylogger, and memory scraper Malware families are customized for different applications resulting in variants Coordinate with cyber threat intelligence to proactively monitor for malware Devalue payment card data and have a incident response plan Know and understand the warning signs and your environment 13

Incident Response Planning Session Recap Incident response planning from Facebook Hire smart people and provide them tools to do their job Security incident plans should be small and flexible Sometimes only a limited amount of information is available Security incidents should be run and managed by people with experience Incident commander who is in charge and provide updates to management Red teams/blue teams are useful and don t limit their access 14

Network Segmentation & Zero Trust Session Recap Benefits of next-gen firewalls and the Zero Trust principle with Palo Alto Networks Today s networks are extremely challenging with various devices and data Controlling the conversations and conversants make it easier to control security through policy Payment card data and devices such as ipads can easily be controlled on the network using next-gen firewalls Adding a Zero Trust policy can help organizations secure internal and external network connections 15

Securing the Payment Value Chain Session Recap Discussing the hyperconnected value chain As the payment industry continues to evolve, the payment value chain is becoming more and more decentralized and it is no longer a simple 4 party model Hyper connectivity can increase complexity of managing risks and it is critical to ensure that all parties are accountable Breaches involving integrators and resellers are increasing PCI SSC Qualified Integrator and Reseller (QIR) program provides training on secure POS system installation MercuryPay recently partnered with Visa, Retail Solutions Providers Association (RSPA), and PCI Security Standards Council (PCI SSC) to offer training to its providers The industry must work together to educate small merchants and offer them simple and affordable solutions 16

Global Brand Protection Global Acquirer Risk Managing Online Pharmaceutical and Nutraceutical Merchants Acquirers must attain the pharmacy s valid and verified licenses for each jurisdiction where the merchant offers to ship prescription medication Be wary of merchants with wholesale pharmacy licenses Interpol will be heavily focused on preventing the illegal sale of medical devices It has become increasingly simple to create websites that look legitimate Acquirer Operational Risk Reviews Have a control environment in place to validate compliance with Global Acquirer Risk Standards (GARS) Ensure proper oversight of Agents When it comes to questionable merchants: Remediate or Terminate, DO NOT facilitate. 17

Third Party Agent Program Updates Criminals are sophisticated, but they are using the same attack vectors Post EMV, criminals may target aggregation points or entities with large amounts of data such as payment facilitators, processors, and gateways The Visa Registry of Service Providers (Global Registry) includes entities who meet Visa program rules and are PCI DSS validated, as applicable 18

Upcoming Events and Resources Upcoming Webinars Under Merchant Resources/Training on www.visa.com The Importance of Containment and Remediation of Compromised Payment Processing Environments, September 2, 2015 Visa Online Merchant Tool Kit provides helpful information to make a seamless EMV transition Streamline your chip migration www.visachip.com/businesstoolkit Visa Data Security Website www.visa.com/cisp Alerts, Bulletins Best Practices, White Papers Webinars PCI Security Standards Council Website www.pcissc.org Data Security Standards, QIR Listing Fact Sheets Mobile Payments Acceptance, Tokenization, and many more