PCI Compliance. PCI Compliance Introduction Scott Jerabek The CBORD Group Product Manager Founded in 1975 Foodservice, Campus Card and Security solutions.

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Payment Card Industry Data Security Standard AAFA ISC/SCLC Fall 08.
National Bank of Dominica Ltd Merchant Seminar Facilitator: Janiere Frank Fraud & Compliance Analyst June 16, 2011.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
.. PCI Payment Card Industry Compliance October 2012 Presented By: Jason P. Rusch.
The Payment Card Industry Data Security Standard (PCI DSS)
PCI DSS for Retail Industry
Payment Card Industry Data Security Standard Tom Davis and Chad Marcum Indiana University.
UCSB Credit Card Processing and PCI Compliance
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
Navigating Compliance Requirements DCM 6.2 Regs and Codes linford & co llp.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Property of CampusGuard Compliance With The PCI DSS.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
Presented by : Vivian Eberhardt, Supervisor Cash and Credit Operations
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Jeff Williams Information Security Officer CSU, Sacramento
Property of the University of Notre Dame Navigating the Regulatory Maze: Notre Dame’s PCI DSS Solution EDUCAUSE Midwest Regional Conference March 17, 2008.
Security Controls – What Works
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Why Comply with PCI Security Standards?
Northern KY University Merchant Training
Payment Card Industry (PCI) Data Security Standard
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
Disclaimer Copyright Michael Chapple and Jane Drews, This work is the intellectual property of the authors. Permission is granted for this material.
Web Advisory Committee June 17,  Implementing E-commerce at UW  Current Status and Future Plans  PCI Data Security Standard  Questions.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
PCI 3.0 Boot Camp Payment Card Industry Data Security Standards 3.0.
PCI DSS Managed Service Solution October 18, 2011.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Introduction to Payment Card Industry Data Security Standard
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Information Security 2013 Roadshow - PCI. Roadshow Outline  What IS PCI  Why we Care about PCI  What PCI Means to You and Me.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
Internet Payment.
Session 11 Other Assurance Services
Payment Card Industry Data Security Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
PCI Compliance : Whys and wherefores
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Presented by: Jeff Soukup
Presentation transcript:

PCI Compliance

Introduction Scott Jerabek The CBORD Group Product Manager Founded in 1975 Foodservice, Campus Card and Security solutions to College and University and Healthcare markets

CBORD Product Portfolio College & University Applications Card Systems Foodservice Housing Online Ordering Commerce Security

Agenda Introduction Payment Card Industry standards Credit card risks CBORD® products and PCI MICROS® point-of-sale Changes in PCI regulations Discussion

Payment Card Industry Standards Entities that store, process, or transmit cardholder data PCI Data Security Standard (PCI-DSS) Covers merchants and service providers Payment Application Data Security Standard (PA-DSS) Covers third-party applications deployed on site

PCI Landscape CBORD® is a Service Provider and provides validated payment applications. MICROS provides validated payment applications. MerchantLink , Elavon, and Shift4 are credit card gateway solutions for MICROS.

Who Is Responsible for Compliance? On-site systems: the merchant Systems hosted 100% off-site: the service provider Hybrid systems with off-site and on-site components that handle cardholder data Service provider responsible for off-site Merchant responsible for on-site

PCI DSS Goal Requirement Build and Maintain a Secure Network 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program 5. Use and regularly update anti-virus software or programs 6. Develop and maintain secure systems and applications Implement Strong Access Control Measures 7. Restrict access to cardholder data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes Maintain an Information Security Policy 12. Maintain a policy that addresses information security for employees and contractors

Impact of Compliance Policies and procedures Training Implementation Ex: Password and remote access policies Ex: Quarterly vulnerability scans Training Ex: Information security training for staff Implementation Ex: Using firewalls to secure network resources Ex: Intrusion detection and anti-virus software Annual compliance assessment and remediation

PCI Scope Any network component, server, or application that is included in or connected to the cardholder data environment Reducing scope reduces risk and cost of compliance Move cardholder data processing off-site to third parties Segment on-site systems that touch cardholder data Limit number of personnel with full access to cardholder data (personnel other than cashiers)

Credit Card Risks PCI DSS represents a minimum level of security that should be applied to your organization’s handling of credit cards. A security breach will: Damage your reputation Cost significant time, effort, and dollars Negatively impact your customers

Breach Liabilities Average cost to institution₁ $202/breached patron record ($90 to $305) Average $6.6M in direct and indirect costs TJX 100 million credit card numbers Estimated cost to TJX range from $118M to $1.3B Target One of the largest breaches in U.S. retail history Investigation is ongoing 70 million credit card numbers 1 Forrester Research If you only have 5,000 cards it is still a $1M issue Forrester data is 2008 Gartner 2009 - $939 / card Symantec 2010 - $214 / card $7M per organization Sony – bigger than TJX

Breach Liabilities Required forensic audit ($50k) Treated at Level 1 (no more self assessment) Fines up to $500k May not be able to continue to accept credit cards

CBORD Products and Services CBORD supports your MICROS point-of-sale Support uses tools that allow you to maintain compliance Hosted products CBORD responsible for compliance (service provider) Minimal PCI impact on your organization ManageMyID®/NetCardManager® Webfood® online ordering GET Funds

CBORD Products (cont.) Housing systems Website payment integration with third parties Catering All credit card processing is hosted by CBORD

CBORD Hosting Layered Tech Validation Process PCI compliant, SSAE 16 Type 2 compliant Physical and Virtual Machines Validation Process CBORD uses Trustwave for validation Trustwave reviews our environment & processes, performs monthly and yearly scans

MICROS Point-of-Sale MICROS information security resources MICROS PA-DSS validated versions Implementation guides and other documentation MICROS security patch documentation Operating-system patch testing results http://www.micros.com/ServicesAndSupport/InformationSecurity/ Use network segmentation to separate MICROS from the rest of your network, including CS Gold® /Odyssey PCS ®

MICROS 3700/RES Refer to MICROS information security link for versions MICROS implementation guide Password policies Database/transport encryption Auditing, purging, etc. Vaulting used to move cardholder data off-site TransactionVault from MerchantLink Card data never stored in on-site MICROS database Point-to-Point Encryption Merchantlink or Shift4 solutions utilize external readers

MICROS 9700/HMS Refer to MICROS information security link for versions MICROS implementation guide Password policies Database/transport encryption Auditing, purging, etc. Vaulting used to move cardholder data off-site Shift4 Card data never stored in on-site MICROS database Point-to-Point Encryption Shift4 solution utilizes external readers

MICROS Simphony Refer to MICROS information security link for versions MICROS implementation guide Password policies Database/transport encryption Auditing, purging, etc. Vaulting used to move cardholder data off-site Merchantlink, Shift4, Elavon Point-to-Point Encryption Merchantlink (Simphony 2.5, coming in 1.7), Shift4

Micros Resources www.micros.com/ServicesAndSupport/InformationSecurity/

Grandfathering PA-DSS Acceptable for existing Acceptable for new deployments New criteria: Adding credit cards (new) Adding Merchant ID (new) Add revenue center (existing) For Existing, if it was listed at the time of installation

Where are we headed?

PA-DSS and PCI-DSS 3.0 Effective January 1, 2014 PCI-DSS 2.0 remains active until December 31, 2014

PCI-DSS 3.0 Updates include: Penetration testing must follow an industry accepted methodology In Scope component inventory Evaluate malware threats for systems not commonly affected by malware Protect POS terminals from tampering and substitution Maintain information about which PCI requirements are managed by service providers vs. merchant

Point-to-Point Encryption (P2PE) Card data is encrypted at the reader and transmitted in encrypted format POS server never “sees” protected card data P2PE can reduce PCI scope

P2PE roadmap - Micros Micros 3700 – Available now with Merchantlink Transaction Shield Micros 9700 – Available now with Shift4 Micros Simphony – Simphony 2.5 MR4 (Merchantlink Transaction Shield) Simphony 1.7 (Q1 2014) (Merchantlink) Shift4 is testing on both platforms & waiting for a few Micros bug fixes

EMV Initiatives Visa has issued incentives to drive smart card adoption (EMV) Both Issuers and Acquirers impacted Carrots: Relief from PCI-DSS Sticks: Liability Shift (October 2015) Micros, Merchantlink, & Shift4 are all working on EMV though it is not yet available on any Micros platforms. European Visa & Mastercard TIP program Effective October 1, 2012 • October 2012: Visa's Technology Innovation Program (TIP) and MasterCard's program go into effect. That means Visa and MasterCard will no longer require merchants to validate PCI DSS compliance, as long as they use dual-interface (contact and contactless), EMV chip-enabled POS terminals for at least 75 percent of transactions. • April 2013: Payment processors must be able to process EMV transactions by this date. • October 2015: A liability shift goes into effect, which means that processors will become responsible for fraud losses from merchants that don't have EMV terminals. The financial responsibility likely will be transferred to operators, so investigate how your POS provider is adapting.

Resources PCI Security Standards Council Quick Reference Guide https://www.pcisecuritystandards.org Quick Reference Guide https://www.pcisecuritystandards.org/pdfs/pci_ssc_quick_guide.pdf Prioritized Approach for Beginners https://www.pcisecuritystandards.org/documents/Prioritized_Approach_V2.0.pdf Ten Common PCI Myths https://www.pcisecuritystandards.org/pdfs/pciscc_ten_common_myths.pdf Validated Service Providers http://usa.visa.com/download/merchants/cisp-list-of-pcidss-compliant-service-providers.pdf Validated Payment Applications https://www.pcisecuritystandards.org/security_standards/vpa/vpa_approval_list.html

Thank You! Scott Jerabek smj@cbord.com Discussion Thank You! Scott Jerabek smj@cbord.com

Forrester Research Breakdown of Individual Breach Costs In order to account for the different variable costs that can be incurred during a data breach, a survey conducted by Forrester Research provided averages in five major cost categories:   Discovery, Response and Notification on average run about $50 per record. This cost includes “outside legal fees, notification costs, increased call center costs, marketing and PR costs, and discounted product offers.” Lost employee productivity on average costs about $30 per record. Dealing with the bad press and legal responsibilities are the major distractions for employees after a breach. Additional regulatory fines. This cost can vary greatly from $0.00 to $10 million, as ChoicePoint found out when paying civil penalties to settle the Federal Trade Commission case. Also, Visa increased the fine for mismanaging sensitive customer data from $3.4 million in 2005 to $4.6 million in 2006. Opportunity costs average about $98 per record, but it significantly varies from industry to industry. Forrester estimates “10% - 20% of potential customers will be scared away by a security breach in a given year,” and Ponemon’s survey indicated that 74% of its respondents lost current customers due to the breach. Indirect costs (for high-profile breaches) often include: Restitution costs - ChoicePoint is the first security breach victim to have to pay restitution costs, wherein they agreed to establish a $5 million consumer restitution fund. Additional security and audit requirements - For example, “DSW’s settlement with the FTC in its 2005 data breach of more than 1.4 million records requires DSW to establish and maintain a comprehensive information security program that includes administrative, technical, and physical safeguards. It also requires DSW to obtain, every two years for 20 years, an audit from a qualified, independent, third-party professional to assure that its security program meets the standards of the order,” per Forrester Research.  Other liabilities - Replacing credit cards is a substantial ‘other cost.’ For example, Sovereign Bank was hit twice by the BJ’s Wholesale Club breach, as the first set of 81,000 replacement cards was malfunctioned.