Retail Security and Compliance Where On Earth is it Headed?



Similar documents
TrustED Briefing Series:

PCI - Why You Need to be Compliant When Accepting Credit Card Payments. Agenda. Breaches in the Headlines. Breach Events & Commonalities

Process of Setting up a New Merchant Account

BAMS Third Party Service Providers (TPSPs) FAQs

Security Services. Service Description Version Effective Date: 07/01/2012. Purpose. Overview

MigrationWiz HIPAA Compliant Migration. Focus on data migration, not regulation. BitTitan Global Headquarters: 3933 Lake Washington Blvd NE Suite 200

Building Secure: Payment Systems & Applications. By: Sarath Geethakumar

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Presentation: The Demise of SAS 70 - What s Next?

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

Cloud Services Frequently Asked Questions FAQ

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Vantiv eprotect iframe Technical Assessment Paper Prepared for:

PROTIVITI FLASH REPORT

PCI Compliance Merchant User Guide

The Secret Life of Data: Protecting Sensitive Information, Mobile to Cloud

Project Management Professional Preparation for Certification CIE 5017 Five 8-hour days (4.0 CEUs)

GUIDANCE FOR BUSINESS ASSOCIATES

HIPAA HITECH ACT Compliance, Review and Training Services

In-House Counsel Day Priorities for Cloud Computing the benefits, potential risks and security for the future

MANAGED VULNERABILITY SCANNING

UNT Payment Card Merchant Handbook

In addition to assisting with the disaster planning process, it is hoped this document will also::

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System

Systems Support - Extended

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

MaaS360 Cloud Extender

Corporate Profile, 2014

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

WEB APPLICATION SECURITY TESTING

IN-HOUSE OR OUTSOURCED BILLING

COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker.

Network Security Trends in the Era of Cloud and Mobile Computing

How To Make A New System For A New Generation Of Computers In The European Republic

STIOffice Integration Installation, FAQ and Troubleshooting

Information Services Hosting Arrangements

Corporate Account Takeover & Information Security Awareness

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

efusion Table of Contents

Education Technology & Libraries Update February 14, PAUSD Board of Education

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM

Frequently Asked Questions: CMMI Data Collection

Nuance Healthcare Services Project Delivery Methodology

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position

Organisational self-migration guide an overview V1-5 April 2014

The user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures.

Using Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors

TRAVELER BENEFITS INCLUDE:

State of Wisconsin. File Server Service Service Offering Definition

Vendor Management. Federal Deposit Insurance Corporation Division of Risk Management Supervision Atlanta Regional Office.

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc.

Privacy and Security. Ryan Dunn, PSO

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

// Solution Brief. Pro-Active Support Services KARMA. Khipu Automated Remote Monitoring Application. Networks, Systems and Security Infrastructure

Electronic Commerce - Effect on the Audit of Financial Statements

Selecting a New Billing & Financial Management System

ERP CONSULTING IT OUTSOURCING

HP Point of Sale FAQ Warranty, Care Pack Service & Support. Limited warranty... 2 HP Care Pack Services... 3 Support... 3

Welcome to CNIPS Training: CACFP Claim Entry

Case Study. Portal Upgrade and Management services to a US based Fast Food Chain. Ananthakrishnan J Architect, Sonata Software

Customers FAQs for Webroot SecureAnywhere Identity Shield

CenterPoint Accounting for Agriculture Network (Domain) Installation Instructions

Introduction to FedRAMP Abel Sussman. June, 2015

QBT - Making business travel simple

FAQs for Webroot SecureAnywhere Identity Shield

Remote Desktop Tutorial. By: Virginia Ginny Morris

Financial Accountability Handbook

How To Get A Credit By Examination

Jumpstart Your Hybrid Cloud Environment. Philipp Behre

To Receive CPE Credit

Avaya Professional Services

Deployment Overview (Installation):

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

BYOD and Cloud Computing

UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. Statement of Thomas F. O Brien. Vice President & Chief Information Officer

White Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite

SERVICES BEST PRACTICES

IT Help Desk Service Level Expectations Revised: 01/09/2012

2010 AT&T Business Continuity Study CENTRAL REGION (Missouri) Results

Shelby County Schools Online Employee Accident Reporting User Manual

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Oracle Cloud Enterprise Hosting and Delivery Policies

MCSA: Windows 7 Boot Camp for Desktop Support Technicians

Sault Ste. Marie Public Library. Request for Proposal. Website Redesign. 50 East Street Sault Ste. Marie, ON P6A 3C3

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY

Aim The aim of a communication plan states the overall goal of the communication effort.

Table of Contents. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.

Unified Communications

Basic concept of Cloud computing

Cloud Contact Centre. Getting smart with customer contact

ICD-10 Frequently Asked Questions: (resource CMS website)

Serv-U Distributed Architecture Guide

Cloud Services MDM. Windows 8 User Guide

Using PayPal Website Payments Pro UK with ProductCart

Junos Pulse Instructions for Windows and Mac OS X

Transcription:

Retail Security and Cmpliance Where On Earth is it Headed? An verview f the retail sectr s IT threats and hw t be mre effective in preventing them.

Agenda Intrductin Retail in the news Why cyber security is imprtant? Where are the threats? What can yu d? Additinal Resurces Questins?

Abut Calfire Calfire is a funding member f the PCI Security Standard Cuncil s (SSC) prgram fr Qualified Security Assessrs (QSAs) and has been a QSA under Visa s CISP initiative since 2003. We are als an Apprved Scanning Vendr (ASV) and Payment Applicatin Qualified Security Assessr (PA-QSA). We have cmpleted mre than 4,000 PCI prjects fr merchants, service prviders and payment applicatin develpers and we are recgnized as ne f the tp five assessrs based n the number f Reprts n Cmpliance cmpleted fr service prviders and Reprts n Validatin cmpleted fr payment applicatin develpers.

Our clients include 4

Abut Jeff Messer Senir IT Security Cnsultant 15+ years f infrmatin technlgy and business experience. Extensive experience in delivering security assessments, cmpliance auditing, general IT and applicatin cntrls assessments and system develpment reviews Industries Retail, higher educatin, healthcare, transprtatin, banking, finance, entertainment and leading edge technlgies. Hands-n experience in develping and implementing IT security strategy, directing and managing an IT department and knwledgeable in varius areas including: Netwrk & Systems Security Risk Management Vulnerability Assessments Authenticatin & Access Cntrl System Mnitring Regulatry Cmpliance Systems Integratin Planning Penetratin Testing Certificatins CISSP - Certified Infrmatin Systems Security Prfessinal CISA - Certified Infrmatin Systems Auditr QSA - Qualified Security Assessr

Retail in the news US FBI Warns Retailers f Further Cyber Attacks Similar t Target Data Breach Target - 40 millin payment card recrds and 70 millin custmers' recrds Neiman Marcus - 1.1 millin cards Michaels (2 nd breach) Sally Beauty - 282,000 cards Sears? Accrding t the FBI there were 20 infectins with BlackPOS. S far, Target and Neiman Marcus are the nly tw t g public.

Why cyber security is imprtant? Increasing reliance n technlgy Attacks are increasing faster than ability t stp them Lts f mney can be made frm stealing the data Public image can be tarnished quickly Crprate espinage Federal agencies mving t the clud

Where are the threats? POS Sftware Mbile POS Remte Desktp/Terminal services Wireless Access Access rights Outsurcing managed services Unencrypted data ver the netwrk SQL injectins Weak cntrls

POS Sftware Have yu patched yur POS devices lately? When was the last time yu upgraded? D yu perfrm any vulnerability scans? Have yu turned n lgging? PA-DSS and P2PE certificatin ptins Magnetic Card Reader POS

Mbile POS Using an ipad r mbile POS device ver wireless? Hw is the device secured? Is the data cached lcally? ipad running POS

Remte Desktp/Terminal Services D yu have a device plugged int the internet? If they use cellular r 3G/4G, where is the firewall? Digi Internatinal Wireless Radi Lantrnix Netwrk Access Server WIFI and Web Access fr Ethernet Devices Ethernet Switches

Wireless ruters Hw is yur netwrk setup? Have yu perfrmed a wireless assessment? Rgue access pints? Wireless Access Pint/Ruter

Access rights Generic and shared accunts? Default accunts? Default passwrds? User = Passwrd? Segregatin f duties? Lgging f rt r admin accunts? User Accunt reviews? User and Access Rights Administratin

Outsurced managed services What have yu utsurced? Have yu checked yur cntract? Are yu mnitring their wrk? Third-party administrating firewall rules

Unencrypted data ver the netwrk Have yu prperly segmented yur netwrk? It s a private/crprate netwrk, that s safe, right? Where des respnsibility begin/end fr sending data? We nly send unencrypted data acrss trusted netwrks. Sniffing the wire

SQL Injectins Have yu escaped r blacklisted any cmmands? Have yu limited the database permissins f the web app? Have yu restricted the type f cmmands, r applied parameterized statements? SELECT * FROM users WHERE name = 'a';drop TABLE users; SELECT * FROM userinf WHERE 't' = 't'; Sample SQL Injectin Line

Weak cntrls When was the last time yu perfrmed a risk assessment? D yu have an external, independent auditr? Are yu experiencing high turnver? D yu d perfrm backgrund checks? We rely n a third-party and they d it

What can yu d? Firewall management Segment yur POS netwrk Training PCI cmpliance Pint-t-pint encryptin (P2PE) Deply a Security Infrmatin and Event Management (SIEM) t mnitr netwrk events Use tw-factr authenticatin when accessing payment prcessing netwrks. Mnitr alerts frm Visa, MasterCard, and Amex Ensure yu are using certified hardware and sftware Whitelist prgrams

Enhance yur existing cyber security Scial engineering Penetratin testing Applicatin penetratin testing Wireless assessment IT risk assessment POS frensic testing Vulnerability scanning IT Audits

Tp 5 trends that we see ahead 1. Cyber attacks are ging t cntinue t increase in frequency, cmplexity and scale. 2. Mbile is n lnger the exceptin. 3. The mve t clud cmputing will shw demnstrable cst savings but will add new risks 4. Data breaches will cntinue t drive new security standards and spending 5. Infrmatin risk management is n lnger an IT prblem its a bard prblem.

Additinal resurces Whitepapers, webinars, blg www.calfire.cm/resurces What t d if yu are cmprmised? http://usa.visa.cm/dwnlad/merchants/cisp_what_t_d_if_cmprmised.pdf Respnd t a breach? http://usa.visa.cm/dwnlad/merchants/cisp_respnding_t_a_data_breac h.pdf Identity Theft Resurce Center - www.idtheftcenter.rg 2014 ITRC Breach Reprt ww.idtheftcenter.rg/images/breach/itrc_breach_reprt_2014.pdf 2014 ITRC Breach Stats Reprt www.idtheftcenter.rg/images/breach/itrc_breach_stats_reprt_2014.pdf Incident Respnse - Best Practices Data Breach Respnse & Preparatin - http://www.idtheftcenter.rg/idtheft/incident-respnse-best-practices.html Interactive Breach/Hacks Diagram www.infrmatinisbeautiful.net/visualizatins/wrlds-biggest-databreaches-hacks/

Fr additinal infrmatin, cntact Jeff Messer Senir IT Security Cnsultant Calfire 16420 Bake Parkway, Suite 100 Irvine, CA 92618 Office: (949) 271-7014 x7089 Cell: (949) 355-9096 jeff.messer@calfire.cm www.calfire.cm www.calfire.cm