Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013



Similar documents
MITIGATING LARGE MERCHANT DATA BREACHES

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Franchise Data Compromise Trends and Cardholder. December, 2010

Global Partner Management Notice

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Why Is Compliance with PCI DSS Important?

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

PCI Security Standards Council

SecurityMetrics Introduction to PCI Compliance

Effectively Managing Data Breaches

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Data Security Basics for Small Merchants

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

North Carolina Office of the State Controller Technology Meeting

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

How To Protect A Web Application From Attack From A Trusted Environment

SecurityMetrics. PCI Starter Kit

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Template for PFI Final Incident Report for Remote Investigations

Data Security for the Hospitality

Becoming PCI Compliant

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Third Party Risk Management Basics. Webinar. 26 February 2015

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.0.

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.1.

V ISA SECURITY ALERT 13 November 2015

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

PCI Compliance Overview

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

PCI DSS. CollectorSolutions, Incorporated

Introduction to PCI DSS Compliance. May 18, :15 p.m. 2:15 p.m.

How To Protect Your Data From Being Stolen

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

Thoughts on PCI DSS 3.0. September, 2014

A Decision Maker s Guide to Securing an IT Infrastructure

Project Title slide Project: PCI. Are You At Risk?

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Payment Card Industry Self-Assessment Questionnaire

University of Sunderland Business Assurance PCI Security Policy

So you want to take Credit Cards!

Payment Card Industry (PCI) Data Security Standard

Technology Innovation Programme

Continuous compliance through good governance

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

PCI Compliance for Healthcare

How To Secure Your Store Data With Fortinet

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance

Qualified Integrators and Resellers (QIR) Implementation Statement

Credit Card Processing Overview

PCI Compliance. Top 10 Questions & Answers

How To Protect Visa Account Information

Payment Card Data and Protected Health Information Security Practices

PCI Compliance Top 10 Questions and Answers

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

HOW TO PROTECT YOUR BUSINESS AND YOUR CUSTOMERS FROM DATA FRAUD

Frequently Asked Questions

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

PCI DSS Payment Card Industry Data Security Standard. Merchant compliance guidelines for level 4 merchants

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW

LogRhythm and PCI Compliance

GFI White Paper PCI-DSS compliance and GFI Software products

PCI Compliance Updates

Adyen PCI DSS 3.0 Compliance Guide

CardControl. Credit Card Processing 101. Overview. Contents

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Transcription:

Encryption and Tokenization: Protecting Customer Data Your Payments Universally Amplified Tia D. Ilori Sue Zloth September 18, 2013

Agenda Global Threat Landscape Real Cost of a Data Breach Evolution of Point-to-Point Encryption and Tokenization Visa Merchant Data Secure Visa Public 2

Visa Global Security Summit The Visa Global Security Summit is a must-attend event for executives from business, government, academia and law enforcement. The conference will explore the intersection of technology and security, and participants will offer diverse perspectives on how industry and government can collaborate to address cyber security issues. Pre-Summit Risk workshops for acquirers, merchants, and processors: Oct 1st General Session: Oct 2nd Register at: http://www.visasecuritysummit.com Visa Public 3

Visa s Multi-Layered Strategy Mitigating fraud through continuous leadership, coordination and investment Maintaining and enhancing stakeholder trust in Visa as the most secure way to pay and be paid Prevent Minimize fraud in the payment system Trust and Partnership Protect Protect vulnerable account data! Advance Execute risk strategies for emerging products and channels Respond Monitor and manage events that occur Visa Public 4

PCI DSS Requirements Commonly Identified Security Deficiencies Network Security Host-based Security Vulnerability Applicable Requirement Default or no firewall / router rules Requirement 1 No DMZ Requirement 1 Insecure remote access, no 2-factor authentication Requirement 8 Insecure operating systems and databases Requirement 6 No patching Requirement 6 No or outdated anti-virus signatures Requirement 5 No password management or access control lists (ACL) Requirement 7 Use of default or shared usernames and passwords Requirement 2 No system logging Requirement 10 No file integrity monitoring Requirement 10 Application Security Incident Response SQL injection / other web-based exploits Requirement 6 No secure coding, independent code review, or penetration testing process in place Requirement 6 No incident response plan Requirement 12 General No monitoring of systems, logs, access control, etc. Requirement 10 Lack of network segmentation has contributed to multiple location breaches Source: Data breach forensic reports Visa Public 5

Data Security Best Practices Implement PCI DSS, including a PA-DSS compliant application Secure remote access connectivity by IP address (or disable if not necessary) Use 2-factor authentication Use strong passwords when accessing POS systems Implement a hardware-based stateful firewall and enable filtering for inbound and outbound traffic Enable logging on systems and periodically monitor for malicious activities Do not use your POS systems to browse the Internet, email, etc. Ensure POS systems have latest anti-virus signature files Remove unnecessary accounts/services on POS systems Enforce data security on third-parties via contracts Enroll in a managed firewall and vulnerability scan program Visa Public 6

Real Cost of a Data Breach Data breaches impacts your company s bottom line Average cost of a data breach was $136 a record $188 in the U.S. Average number of breached records was 23,647 28,765 in the U.S. U.S. organizations spent on average $565,020 on notification costs Root cause of U.S. breaches Malicious or criminal attack 41% Human factor 33% System glitch 26% Source: Ponemon/Symantec 2013 Cost of Data Breach Study Visa Public 7

Poll Question #1 What payment security issues keep you up at night? Is my data secure? Has my payment environment been breached? What can I do to protect my data from hackers? All of the above Visa Public 8

Point-to-Point Encryption and Tokenization how did we get here? Major Breaches TJ Maxx, 2007: In the first major breach, hackers embedded malware onto an internal network stealing 46 MM cards Heartland, 2009: A multi-month malware intrusion compromised information for nearly 100 MM payment cards Global Payments, 2012: International hackers embedded malware to capture 1 MM payment cards, and PII data Increased Vigilance Visa released guidance docs Encryption in 2009 and Tokenization in 2010 PCI SSC released guidance docs Encryption in 2010 and Tokenization in 2011 Encryption Market Today Many solution providers offer products Lack of clarity for leading industry practices Visa continues leading PCI SSC and the industry in development of standards and solutions Sources: Bloomberg Business Week, BankInfo Security, The Boston Globe Visa Public 9

Transaction Flow Point-to-Point Encryption 1. POS Transaction 2. Data Encryption 3. Leading Security Original Card Number: 4000123456789010 Tokenization 6. Safe Storage Encrypted Card Number: 4000129999999010 5. Secure Transmission Decrypted Card Number: 4000123456789010 4. Return Token Stored Value: 4123456789101112 Card Token: 4123456789101112 Card Token: 4123456789101112 Visa Public 10

EMV and Point-to-Point Encryption EMV Only Dynamic authentication Cardholders Account number and card data remain exposed Exposure of sensitive information results in crosschannel fraud V: 4000123456789010 MC: 5000123456789010 AmEx: 340012345678901 5000123456789010 340012345678901 4000123456789010 Payment Network Transactions in the Clear EMV and Encrypted Transactions Dynamic authentication Account number and card data are protected in transit Strongly mitigates the risk of point-of-sale and crosschannel fraud Cardholders MC: 5000123456789010 AmEx: 340012345678901 V: 4000123456789010 500012XXXXXX9010 340012XXXXXX901 400012XXXXXX9010 Payment Network Encrypted Transactions Visa Public 11

PCI SSC and P2PE/Tokenization P2PE PCI has introduced a validation program for Point-to-Point Encryption Merchants who use a validated P2PE Solution may qualify for scope reduction 2013 and 2014 releases will likely focus on hybrid (aka software) encryption Tokenization In addition to the Guidance previously released, PCI SSC has started to look at Tokenization Standards and Requirements See the PCI website at https://www.pcisecuritystandards.org for more information Visa Public 12

Technology solutions who could they help in securing payment data? Brick and Mortar Merchant E-Commerce Merchant Service Provider Hardware Encryption Software Encryption Tokenization Visa Public 13

Poll Question #2 Have you implemented a P2PE solution? If not, are you looking at one? Yes, and it works well Yes, but we re looking for an alternative No, but we re interested No, and we re not interested Visa Public 14

Visa Merchant Data Secure with Pointto-Point Encryption (VMDS with P2PE) Is Being Developed to: Protect Sensitive Card Data Information Encrypt from the POS to a Card Network Integrate Seamlessly into Existing Business Processes Encrypt All Card Brand Data in Transit Be a Leading Industry Standard VMDS w/ P2PE Offer Scalable Technology and Be Flexible for All Merchant Sizes Proposed service in development and presented for discussion purposes only; service functionality, features and timelines subject to change by Visa at any time. Visa Public 15

Visa Merchant Data Secure Product Features Merchant Data Secure Hardware Encryption Single Key Injection Zone Translation Standards-based (TDES + DUKPT) Use of zone translation and standards-based technology enables VMDS w/p2pe to become an industry standard for encryption Proposed service in development and presented for discussion purposes only; service functionality, features and timelines subject to change by Visa at any time. Visa Public 16

Roadmap for Development Visa Plans to Expand the VMDS Product Suite by Providing Customers with Solutions for Enterprise Security 2013 2014 2014 2014 Hardware Encryption Encryption in hardware from the Point of Interaction either dip, swipe, tap or keyed Product Evaluation Summit Conference to share changes in the industry and discuss new product features Tokenization Transforming card data into a surrogate value Software Encryption Secure e-commerce transactions Proposed service in development and presented for discussion purposes only; service functionality, features and timelines subject to change by Visa at any time. Visa Public 17

Visa Global Security Summit The Visa Global Security Summit is a must-attend event for executives from business, government, academia and law enforcement. The conference will explore the intersection of technology and security, and participants will offer diverse perspectives on how industry and government can collaborate to address cyber security issues. Pre-Summit Risk workshops for acquirers, merchants, and processors: Oct 1st General Session: Oct 2nd Register at: http://www.visasecuritysummit.com Visa Public 18

PCI SSC Community Meeting PCI Security Standards Council (SSC) North America Community Meeting September 24-26, 2013 Las Vegas, Nevada Visa will host office hours throughout the community meeting Participating organization are encouraged to take advantage of this unique opportunity to engage with Visa representatives For more information please visit https://www.pcisecuritystandards.org/communitymeeting/2013/northamerica Visa Public 19

Questions Your Payments Universally Amplified For More Information Please Contact: Sue Zloth mds@visa.com www.visamerchantdatasecure.com Tia D. Ilori cisp@visa.com www.visa.com/cisp Visa Public 20