What does it mean to be secure?



Similar documents
PCI: It Never Ends. Why?

How To Protect Your Data From Being Stolen

PCI DSS. Payment Card Industry Data Security Standard.

Project Title slide Project: PCI. Are You At Risk?

A PCI Journey with Wichita State University

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

Becoming PCI Compliant

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Client Security Risk Assessment Questionnaire

PCI Requirements Coverage Summary Table

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

PCI Requirements Coverage Summary Table

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

SecurityMetrics Introduction to PCI Compliance

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

PCI Compliance 3.1. About Us

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Foregenix Incident Response Handbook. A comprehensive guide of what to do in the unfortunate event of a compromise

Property of CampusGuard. Compliance With The PCI DSS

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Why Is Compliance with PCI DSS Important?

How To Protect Your Credit Card Information From Being Stolen

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)

Customer PCI 3.0 Changes = New Opportunity For You. Giles Witherspoon-Boyd SecurityMetrics

Data Security for the Hospitality

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

Payment Card Industry Data Security Standards

PCI COMPLIANCE GUIDE For Merchants and Service Members

PCI DSS Security Awareness Training for University of Tennessee Credit Card Merchants. UT System Administration Information Security Office

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Payment Card Industry - Achieving PCI Compliance Steps Steps

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Payment Card Industry Data Security Standard

CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.

PCI Data Security Standards

Achieving Compliance with the PCI Data Security Standard

New PCI Standards Enhance Security of Cardholder Data

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

The PCI DSS Compliance Guide For Small Business

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Josiah Wilkinson Internal Security Assessor. Nationwide

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Protecting Your Customers' Card Data. Presented By: Oliver Pinson-Roxburgh

worldpay.com Understanding the 12 requirements of PCI DSS SaferPayments Be smart. Be compliant. Be protected.

PCI Compliance for Cloud Applications

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

5 Steps to Implement & Maintain PCI DSS Compliance.

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Technical breakout session

PCI Compliance at The University of South Carolina. Failure is not an option. Rick Lambert PMP University of South Carolina

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

Continuous compliance through good governance

SecurityMetrics. PCI Starter Kit

Payment Card Industry Data Security Standards.

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Overcoming PCI Compliance Challenges

Merchant guide to PCI DSS

Accepting Payment Cards and ecommerce Payments

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

PAYMENT CARD INDUSTRY (PCI) ANNUAL TRAINING DECEMBER 10, 2009 WESTERN ILLINOIS UNIVERSITY OFFICE OF THE CTSO & BUSINESS SERVICES

INCIDENT RESPONSE CHECKLIST

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Introduction. PCI DSS Overview

Key USP s. Multiple PCI level GRC tool

IT Security Compliance PCI DSS FOR MERCHANTS THE PAYMENT CARD INDUSTRY DATE SECURITY STANDARD WHITE PAPER

Miami University. Payment Card Data Security Policy

How To Protect Your Business From A Hacker Attack

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

How To Protect Visa Account Information

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

PAI Secure Program Guide

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Transcription:

OmegaSecure.com What does it mean to be secure? Shekar Swamy, President Omega ATC

What is Data Security? Data security is the means of ensuring that data is kept safe from corruption and access to it is suitably controlled. Thus Data security helps to ensure privacy. It also helps in protecting personal data.

Data Security It's all about Protecting Your Stores It s about securing your networks and infrastructure It s about securing applications and databases It's about ensuring business continuity It's about minimizing risk of a breach It's about systems auditing and forensics It's about quickly recovering from an incident Its about being constantly on the vigil Finally it's about making sure that you as a merchant are in control over your destiny

PCI is an ongoing journey You cannot achieve it overnight and you are never done applications, systems, infrastructure and policies Significant accomplishment in reducing reporting requirements (SAQ C) for smaller merchants No reduction in limiting the requirements to be compliant with PCI DSS You still agree to be fully compliant with PCI DSS attestation of compliance - know what you are signing

Important areas to pay attention External scanning Internal scanning Secure encrypted remote control 2 FA Patch Management regularly done and tracked Malware / Anti-Virus Protection must run and keep it up-to-date logging is required Network Segmentation limits scope reduces risk No Cardholder Data Retained in the Clear you need to validate this Wireless intrusion detection Logging the reason why this is important

Why is logging important? Multi-store environments where systems are remotely managed depend on proactive alerts you need to get help Other logs such as system event logs patch history, application version validation, local policies, Firewall, AV, FIM are required for PCI DSS and for forensics in the event of a breach Centralized consolidated logs from multiple locations allows you to meet PCI DSS requirements

What are you going to do? If a customer calls and says she suspects someone fraudulently used her card information at a specific store If there is a breach at one of your stores If you have to get a PCI audit done If the state laws require you to protect customer information

When a breach occurs QIRAs (Qualified Incident Response Assessor) don t look at SAQs they go to PCI DSS for determination of compliance and cause of breach 286 controls No proof means no compliance Evidentiary support takes time to build You as a merchant will need to be prepared Multi-store environments are at high risk

C-store employee impact on Data Security Your first line of defense Well-crafted policies followed by employees offers you the best protection People need to know what to look for and what to do to protect information and systems Employee turnover requires change management Incidence response plan depends on good policies

Security and Compliance Focus on data security and PCI compliance will fall out of it Remediation of problems in a proactive manner is essential for data security Get help there are heavy lifting requirements Filling out a form is not the end goal Single pane of glass for data security is now possible and affordable