Network Segmentation. June 30, 2015 12:00 Noon Eastern



Similar documents
Mobile Commerce is Ready for Prime Time. July 31, :00 Noon Eastern

PCI P2PE 2.0. What Does it Mean for Merchants and Processors? September 10, 2015

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

Why Is Compliance with PCI DSS Important?

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

Project Title slide Project: PCI. Are You At Risk?

Josiah Wilkinson Internal Security Assessor. Nationwide

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

A PCI Journey with Wichita State University

PCI v2.0 Compliance for Wireless LAN

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Franchise Data Compromise Trends and Cardholder. December, 2010

PCI Compliance Top 10 Questions and Answers

Mitigating Card System Breaches. October 11, :00 pm 2:50 pm

PCI Compliance. Top 10 Questions & Answers

Payment Card Industry (PCI) Data Security Standard

PCI Requirements Coverage Summary Table

HOW SECURE IS YOUR PAYMENT CARD DATA?

PCI Requirements Coverage Summary Table

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Mobile Device Payment Card Processing: How Secure is It? Richard Poworski CISSP, ISP, ITCP, SCF, PCI QSA, PCIP Managing Consultant

Payment Card Industry (PCI) Data Security Standard

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

Four Keys to Preparing for a PCI DSS 3.0 Assessment

The PCI DSS Compliance Guide For Small Business

PCI Compliance Training

Data Security for the Hospitality

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Give Vendors Access to the Data They Need NOT Access to Your Network

Data Security Basics for Small Merchants

Eagle 8.0 Release Notes

Version 7.4 & higher is Critical for all Customers Processing Credit Cards!

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Credit Card Processing Overview

Point Secure Commerce Application (SCA) 2.x PCI PA-DSS Out of Scope White Paper

PCI DSS. Payment Card Industry Data Security Standard.

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

Becoming PCI Compliant

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards

GFI White Paper PCI-DSS compliance and GFI Software products

Sage ERP MAS I White Paper. Payment Processing Trends, Tips, and Tricks: What You Need to Know

Payment Card Industry (PCI) Data Security Standard

CardControl. Credit Card Processing 101. Overview. Contents

Payment Card Industry (PCI) Data Security Standard

PCI DSS. CollectorSolutions, Incorporated

Sage 100 ERP I White Paper. Payment Processing Trends, Tips, and Tricks: What You Need to Know

Security. Tiffany Trent-Abram VP, Global Product Management. November 6 th, One Connection - A World of Opportunities

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Global Partner Management Notice

paypoint implementation guide

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers.

Conquering PCI DSS Compliance

The Relationship Between PCI, Encryption and Tokenization: What you need to know

Technical breakout session

Ruby VASC Instructor Guide

PCI: It Never Ends. Why?

PCI Compliance Overview

Thoughts on PCI DSS 3.0. September, 2014

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Payment Card Industry (PCI) Data Security Standard

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

MITIGATING LARGE MERCHANT DATA BREACHES

IT TECHNICAL SECURITY REVIEW CHECKLISTS FOR E-COMMERCE WEBSITES

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

PCI COMPLIANCE AND WHAT IT MEANS TO YOU IN ENGLISH

Best Practices (Top Security Tips)

Section 1: Assessment Information

PCI PA-DSS Requirements. For hardware vendors

1/18/10. Walt Conway. PCI DSS in Context. Some History The Digital Dozen Key Players Cardholder Data Outsourcing Conclusions. PCI in Higher Education

So you want to take Credit Cards!

Transcription:

Network Segmentation June 30, 2015 12:00 Noon Eastern

Agenda Presenters Housekeeping About Conexxus Network Segmentation Presetation Q& A

Presenters Carl Bayer (cbayer@conexxus.org) Program Manager Conexxus Kara Gunderson (kgunder@citgo.com) POS Manager Citgo Petroleum Corporation Mark Carl (mcarl@echosat.com) CEO EchoSat Communications Group, Inc.

2015 Conexxus Webinar Schedule* Month/Date Webinar Title Speaker Company June 30, 2015 Network Segmentation Mark Carl Echosat July Mobile Commerce Wesley Burress Don Friedman ExxonMobil P97 August Point 2Point Encryption P2PE TBD September Asset Tracking in PCI 3.0 TBD October NACS Show in Las Vegas No Webinar No Webinar November Open TBD December Conexxus Year end review TBD If you have a suggestion for a webinar, please contact Carl Bayer with Conexxus at cbayer@conexxus.org. * Update: June 9, 2015

About Conexxus We are an independent, non-profit, member driven technology organization We set standards Data exchange Security Mobile commerce We provide vision Identify emerging tech/trends We advocate for our industry Technology is policy

Future Events The NACS Show October 11-14, 2015 Las Vegas Convention Center Las Vegas, Nevada 2016 Conexxus Annual Conference May 1 5, 2016 Loews Ventana Canyon Resort Tucson, Arizona

Network Segmentation Limiting Your PCI-DSS Scope Mark Carl

Who The Heck Are You? CEO at EchoSat, Inc. Formerly EchoSat s CTO for 16 years Designed and developed EchoSat SPG Designed and developed PaySafe SPG managed firewall solution Provide gateway and technology for Heartland SmartLink Pro Servicing 20,000 petro merchants across many brands Securely delivering 12% of all petro transactions to the acquirers Level 1 PCI-DSS compliant service provider since 2008

Security Versus Compliance Who wins? Most large breaches occur within PCI-compliant networks PCI-DSS is not security, it s a minimum standard Will the card brands issue fines even if you re compliant? Absolutely. If you think they won t, just ask Target Conclusion: You need a security expert, not a compliance expert Managed service providers should provide both Service providers can transfer responsibility under PCI3 12.8 Make sure SOMEBODY is responsible Recognizing intrusion is as important as preventing it

Do I Have To Do This Myself? NO! Third Party Security Assurance (TPSA) is in your favor Defines Third Party Service Providers (TPSP s) Explains TPSP and merchant responsibilities Does NOT relieve merchant from PCI-DSS responsibility PCI-DSS 12.8.2 requires written agreements with TPSP s Merchants must acknowledge what s being provided

What does PCI-DSS say about network segmentation? Not a PCI-DSS requirement Used to reduce the assessment scope for PCI-DSS Can be physical or logical separation of components Must be assessed adequate by QSA, or transferred by service provider Isolates systems that store, process or transmit cardholder data This includes the devices that provide the isolation

No Separation Entire network is within PCI scope InterWebs Security WiF i Backoffice PO S

Physical Separation Limiting PCI-DSS scope physically InterWebs Security WiF i Backoffice PO S

Logical Separation Limiting PCI scope logically InterWebs Security WiF i Backoffice PO S

Why Do We Need to Segment? Meet Jim, Our Store Manager..

How Do Attackers Work? Find an initial entry point, using phishing, etc Gather and analyze information from the entry point Leverage and expand access from the breach point Use expanded access for mass financial gain

Where s the Threat? Actual threat. InterWebs Threat misconception. Security Jim s PC WiF i Backoffice PO S

Why is Jim Our Primary Threat? Jim gets an email that his Apple ID has expired, and clicks the link.. and Jim s PC is now under the control of a hacker InterWebs Hacker launches persistent aggressive attack against POS POS

How do we mitigate? We block Jim s PC from the POS. and permit only necessary traffic InterWebs Security Jim s PC WiF i Backoffice PO S

How do we mitigate? We monitor Jim s connections for viruses and malware and isolate the POS to the acquirer InterWebs Gateway/Acquirer Jim s PC PO S

Are We Done Now? We have to monitor, log and alert! Some examples NO! InterWebs Gateway/Acquirer Jim s PC Log attempts to the POS from Jim s PC, and alert someone about intrusion attempts. Log Log and and alert alert attempts any new from devices the POS to on connect the POS to segment anywhere that shouldn t besides be the there acquirer or other necessary destinations PO S

Why Log and Alert? Log, don t alert. Log, don t alert. Call 911. Gateway/Acquirer POS Vendor Updates Some Server in China PO S

What s On My POS Know and understand what s here, and why.. Segment? Vendor Zone Routers are PCI-DSS, not PA-DSS.. Covered By PA DSS POS Pinpad POS Pinpad EPS

Vendor Zone Routers May provide POS vendor back-door access to your CDE Likely provided by another third party Must meet rules of PCI-DSS 12.8.2 and TPSA Requires logging, monitoring and alerting Significantly impacts your CDE Vendor must transfer under TPSA and 12.8.2 Otherwise, you cannot meet 12.8.2 for your CDE InterWebs Vendor Support Vendor Zone Routers are PCI-DSS, not PA-DSS..

THANK YOU

Thank you for attending today s webinar: Network Segmentation If you found today s webinar valuable, please consider supporting Conexxus by becoming a member so we can continue to bring you new and relevant content. http://www.conexxus.org/content/membership Follow the link to learn more.