Understanding and Managing PCI DSS



Similar documents
1/18/10. Walt Conway. PCI DSS in Context. Some History The Digital Dozen Key Players Cardholder Data Outsourcing Conclusions. PCI in Higher Education

Agenda: A PCI DSS Deep Dive

PCI DSS Gap Analysis Briefing

Complying with Payment Card Industry Data Security Standards (PCI DSS) Requirements. Approaches in Higher Education

PCI Compliance Overview

Why Is Compliance with PCI DSS Important?

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

Adyen PCI DSS 3.0 Compliance Guide

PCI DSS Compliance Information Pack for Merchants

Introduction to PCI DSS Compliance. May 18, :15 p.m. 2:15 p.m.

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

Frequently Asked Questions

Information Technology

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

SecurityMetrics Introduction to PCI Compliance

It is important to note, the payment brands and acquirers are responsible for enforcing compliance, not the PCI council.

Your Compliance Classification Level and What it Means

Josiah Wilkinson Internal Security Assessor. Nationwide

How To Protect Your Business From A Hacker Attack

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Payment Card Industry Data Security Standard

PCI Compliance. Top 10 Questions & Answers

Merchant guide to PCI DSS

PCI Compliance Top 10 Questions and Answers

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines?

The PCI DSS Compliance Guide For Small Business

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

Payment Card Industry - Achieving PCI Compliance Steps Steps

Project Title slide Project: PCI. Are You At Risk?

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to:

PCI DSS Compliance What Texas BUC$ Need to Know! Ron King CampusGuard

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Payment Card Industry (PCI) Data Security Standard

Introduction to. May 18, :15 p.m. 2:15 p.m.

PCI DSS Presentation University of Cincinnati

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

2.0 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS (PCI-DSS)

PCI DSS. CollectorSolutions, Incorporated

* Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level.

Credit Card Handling Security Standards

An article on PCI Compliance for the Not-For-Profit Sector

Appendix 1 Payment Card Industry Data Security Standards Program

How To Protect Your Credit Card Information From Being Stolen

PCI Compliance: How to ensure customer cardholder data is handled with care

PROTECTION OF OUR MERCHANTS AND REFERRAL PARTNERS IS OUR FIRST CONCERN

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

University Policy Accepting Credit Cards to Conduct University Business

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance

PCI Compliance at The University of South Carolina. Failure is not an option. Rick Lambert PMP University of South Carolina

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

Becoming PCI Compliant

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008

SecurityMetrics. PCI Starter Kit

White Paper September 2013 By Peer1 and CompliancePoint PCI DSS Compliance Clarity Out of Complexity

PAI Secure Program Guide

And Take a Step on the IG Career Path

Mobile Device Payment Card Processing: How Secure is It? Richard Poworski CISSP, ISP, ITCP, SCF, PCI QSA, PCIP Managing Consultant

PAYMENT CARD INDUSTRY (PCI) ANNUAL TRAINING DECEMBER 10, 2009 WESTERN ILLINOIS UNIVERSITY OFFICE OF THE CTSO & BUSINESS SERVICES

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

CAL POLY POMONA FOUNDATION. Policy for Accepting Payment (Credit) Card and Ecommerce Payments

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015

Version 7.4 & higher is Critical for all Customers Processing Credit Cards!

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

PCI Data Security Standards

Vanderbilt University

CREDIT CARD MERCHANT POLICY. All campuses served by Louisiana State University (LSU) Office of Accounting Services

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

Saint Louis University Merchant Card Processing Policy & Procedures

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES

A Compliance Overview for the Payment Card Industry (PCI)

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

How To Protect Visa Account Information

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

Registration and PCI DSS compliance validation

A PCI Journey with Wichita State University

Standards for Business Processes, Paper and Electronic Processing

Accepting Payment Cards and ecommerce Payments

Payment Card Industry Data Security Standards Compliance

Transcription:

Understanding and Managing PCI DSS

PCI DSS in Context Some History Key Players Validating Compliance Cardholder Data 2!

5 Stages of PCI Grief Denial: It doesn t apply to me PCI compliance is mandatory Anger: It isn't fair PCI applies to everybody Bargaining: I ll do some of it Compliance is pass / fail Depression: I ll never get there Many merchants already have Acceptance: It ll be OK PCI addresses things you should already be doing 3!

First, Some PCI Basics PCI DSS: Payment Card Industry Data Security Standard Goal is to protect Cardholder Data (CHD) Primary Account Number (PAN) Also addresses track data, security codes, PINs If you take plastic, PCI applies to you Store, process, or transmit cardholder data P-cards, travel cards may be in scope PCI Compliance is by institution Most schools use Self-Assessment Questionnaire (SAQ) 4!

PCI DSS: 6 Goals, 12 Requirements 5!

PCI DSS Scope The cardholder data environment can include: Network components (firewall, switches, routers ) Servers (web, database, mail ) Applications (purchased, custom, internal, external) Policies, procedures Anything that stores, transmits, or processes cardholder data is in scope If you don t need it, don t keep it 6!

Key Players Global forum to enhance global payment security PCI DSS, PA DSS, PIN PED Approve assessors (QSAs) and scan vendors (ASVs) Develop Self-Assessment Questionnaires (SAQ) Develop and publish PCI documentation 7!

Key Players Participating Organizations provide a voice for merchants and processors Participating Organizations include NACUBO with Treasury Institute for Higher Education A voice for Higher Education Tom Davis of IU is technical representative 8!

Key Players Five Payment brands Track compliance and enforce standards (fines, sanctions) Determine event response (forensics) Define merchant levels Acquirers (Merchant Banks) Set merchant level Certify compliance Approve compensating controls 9!

The PCI Chain 10!

Cardholder Data 11!

Quiz: Which are Cardholder Data? Name + expiry date + service code 1234 5678 9012 3456 + name + expiry date 1234 56xx xxxx 3456 + name + expiry date 1234 56xx xxxx 3456 + name + CVV2 1234 5xxx xxx2 3456 + name Name + expiry date + service code + signature 12!

Why Are You Keeping Those Data? Policy: Store no PANs on campus anywhere But what about? Recurring payments acquirer has alternatives Chargebacks, refunds let acquirer store PAN data Legal requirements these apply to banks, not you Paper receipts upgrade terminals to truncate PAN on both copies POS software stores PANs reconfigure or replace P-cards and travel cards yes, they are in scope 13!

Validating Compliance Validation is by institution Don t confuse Merchant Level and Merchant ID Level is for compliance validation ID is for accounting Acquirer may combine IDs for PCI validation Simplified SAQs Four versions: depends on card environment Limiting PCI scope simplifies validation Common element: no electronic cardholder data 14!

Compliance is Widespread 15!

Security The Bad Guys Higher Ed top 10 Threats The Insider Threat 16!

Security: It s About the Data Five emerging threats Malware Botnets Cyber warfare VoIP and mobile devices Evolving cyber crime economy Data will continue to be the primary motive behind future cyber crime. 17!

PCI DSS Role The purpose of PCI DSS: To protect cardholder data To keep you and your institution out of the headlines PCI is a data protection standard Not a fraud prevention measure PCI does not make you secure 18!

Gone Phishing 19!

Some Links are Good, Others Not 20!

Are Users Listening? Is Anybody Listening? Source: Psychology Department, North Carolina State University! 21!

Higher Ed Top 10 Security Threats 1. Malware, botnets 2. Thieves 3. Staff members 4. Professors 5. Students 6. Outsource partners 7. Social networks 8. Phishing 9. Cell Phones 10. Spammers 22!

The Insider Threat Well-intentioned staff Just trying to do their jobs Self-interested or malicious staff Intentionally download apps or visit prohibited sites Economy is affecting this group Trusted partners Third-parties with insider privileges 23!

The Insider Threat 20% of users changed security settings to access unauthorized websites Over 80% of enterprises show Google application activity, and nearly all evidence peer-to-peer applications 35% of users consciously violate internal security policies (to expedite their work) Over 50% of employees who left their job in 2008 took some company confidential information with them 24!

Your Staff and the Web People under the age of 28 are engaging in online behavior that could expose their organizations to data leakage and theft. 60% of young staff "are either unaware of their companies' IT policies or are not inclined to follow them. 25!

Security: Why Care? Expense: lawsuits, financial liability, fixing systems Lost productivity Reputation (brand) State laws requiring notification and often more The number of Higher Ed breaches is too high 26!

Security: Why Care? 27!

Breaches are Expensive Benchmark: $197 per account compromised Small breach (5,000 accounts) can cost $1 million Brand risk is bigger PCI compliance is not just required, it makes good business sense 28!

PCI Conclusions Getting PCI Compliant Staying Compliant Do the Math The Reality of PCI 29!

Staying Compliant You re compliant so order some pizza but don t relax too much PCI is backward looking Compliance today says nothing about tomorrow You are one system or process change from being non-compliant Establish and follow policies Educate, train, communicate 30!

Compliance OMG (aka, Scope Creep) But we outsourced our e-commerce Staff use PCs to enter MOTO transactions P-cards and travel cards don t count If you store the PANs, they can be in scope We didn t know we stored the data Non-compliant POS devices, PCs, servers, 31!

Do the Math V C System change, not following policies, C S PCI is a data protection standard So what makes you think V = S? For advanced pupils: S 100% There is no such thing as perfect security 32!

The Reality of PCI Compliance is a journey, not a destination Compliance takes resources People Business practices Technology Budget PCI is not going away Walter Conway Associates LLC 2008!

The Reality of PCI Your costs will go up Cost to get and remain PCI compliant Non-compliance costs more You will change the way you do business Do you want to be in the payment business? Maybe fewer campus merchants take plastic Limiting access to cardholder data Conclusion: PCI is a business issue 34!

Conclusions Take control You can t outsource responsibility PCI training has a very high ROI! Senior management commitment and multidisciplinary team are critical Network with other institutions If you don t need it, don t keep it 35!

Higher Education Community Resources The Treasury Institute for Higher Education: www.treasuryinstitute.org PCI blog: www.treasuryinstitute.org/blog NACUBO: www.nacubo.org 36!

Additional PCI Resources Society of Payment Security Professionals: www.paymentsecuritypros.com Blogs, PCI forum PCI SSC: pcisecuritystandards.org Standards, FAQ, PA DSS Visa: visa.com/cisp PCI-compliant service providers MasterCard: mastercard.com/us/sd 37!

5 Stages of PCI Grief Have You Moved Up a Stage? Denial: It doesn t apply to me PCI compliance is mandatory Anger: It isn't fair PCI applies to everybody Bargaining: I ll do some of it Compliance is pass / fail Depression: I ll never get there Many merchants already have Acceptance: It ll be OK PCI addresses things you should already be doing 38!

Understanding and Managing PCI DSS YOUR thoughts? Comments? Questions? walt@walterconway.com www.walterconway.com 39!