Security & PCI Compliance The Future of Electronic Payments Security & PCI Compliance Greg Grant Vice President – Managed Security Services.

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

Payment Card Industry Data Security Standard AAFA ISC/SCLC Fall 08.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
Mobile Payment Security The Good, the Bad and the Ugly
PCI DSS for Retail Industry
UCSB Credit Card Processing and PCI Compliance
Troy Leach April 2012 The PCI Security Standards Council.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
ETA UNIVERSITY MARCH 19, 2015 Deana Rich R ICH C ONSULTING, I NC. Edward A. Marshall A RNALL G OLDEN G REGORY LLP Payments 101: Overview of the Payments.
CONFIDENTIAL AND PROPRIETARY ©2014 DISCOVER FINANCIAL SERVICES 2014 Discover ® Dealer Incentive Program & EMV Update.
PCI Compliance Roundtable Update Presented by the PCI Compliance Task Force.
Smart Payment Processing ™ Protecting Your Business from Card Data Theft Presenter: Lucas Zaichkowsky.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
PCI DSS Version 3.0 For Controllers and Business Users Luke Harris, Office of State the Controller David Reavis, UNC General Administration November 10,
Visa Europe Implementing PCI DSS Requirements Within Your Organisation September 2008 Simon Breeden.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Jeff Williams Information Security Officer CSU, Sacramento
Visa Cemea Account Information Security (AIS) Programme
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Why Comply with PCI Security Standards?
Northern KY University Merchant Training
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
Web Advisory Committee June 17,  Implementing E-commerce at UW  Current Status and Future Plans  PCI Data Security Standard  Questions.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
The ABC’s of PCI DSS Eric Beschinski Relationship Manager Utility Payment Conference Kay Limbaugh Specialist, Electronic Bills & Payments &
PCI DSS Managed Service Solution October 18, 2011.
Protecting Customer Websites and Web Applications Web Application Security.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
PCI requirements in business language What can happen with the cardholder data?
Date goes here PCI COMPLIANCE: What’s All the Fuss? Mark Banbury Vice President and CIO, Plan Canada.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Presented by Bob Wesolowski James R. Rennert, CFRE President Dir. of Mission Advancement Caring Habits, Inc. Sisters of St. Joseph Briarcliff Manor, NY.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
Smart Payment Processing ™ Recur} Happen again. Persist. Return. Come back. Reappear. Come again.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Wireless Intrusion Prevention System
What you need to know about PCI-DSS Jane Drews Chief Information Security Officer Information Security & Policy Office
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Jon Bonham, CISA, QSA Director, ERC
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
PCI 3.1 Boot Camp Payment Card Industry Data Security Standards 3.1.
PCI COMPLIANCE & A/R AUTOMATION 101 Nodus Technologies, Inc.
Credit Card Compliance
Payment Card Industry (PCI) Rules and Standards
Wake Forest University
Summary of Changes PCI DSS V. 3.1 to V. 3.2
Blackboard Security System
Payment card industry data security standards
Internet Payment.
Breaches by Merchant Type
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Making card acceptance work for you
PCI Compliance : Whys and wherefores
Utility Payment Conference
DieboldNixdorf.com Tokenization Roman Cinkais |
Presentation transcript:

Security & PCI Compliance The Future of Electronic Payments Security & PCI Compliance Greg Grant Vice President – Managed Security Services

Payment Technology Trends Enterprise Class Businesses Migration/Early adoption of newer payment technologies such as Point-to-Point Encryption (P2PE) Leading the “charge” for EMV implementation Small-to-Mid Sized Businesses (SMB’s) Focus on upgrading POS operating systems, equipment, devices Remain highest users of traditional Terminal/Server systems Movement away from dial-up to Internet connected processing Everyone is looking at wireless enabled payment systems Major driving force behind technology changes is PCI, but not necessarily SECURITY

Payment Technology Realities Data breaches and card theft continues to go up PCI compliance rates are up / so are breaches ??? Networks remain “flat” so sensitive data can be targeted via other IP connected devices Hackers are looking downstream (SMB’s) because they are the most unsecured Most businesses either do not properly deploy and maintain security technologies (plus resources) or they cannot afford it Businesses have adopted a “check box” mentality and are only concerned about getting their PCI Certificate of Compliance Believe that PCI compliance means they are secure Confusion over PA DSS and PCI DSS Mandates are getting harder to comply with in 2015 Big emphasis on companies providing services that could impact cardholder dataBig emphasis on companies providing services that could impact cardholder data

Common Network Landscape – Highly Unsecure

Properly Secured Data Network

Emphasis on Service Providers Service Providers (SP) are defined by the PCI Council as: “Companies directly involved in the processing, storage, or transmission of cardholder data, or companies that provide services that could impact the security of cardholder data.” Common examples include: Transaction Processors, Payment Gateways, Managed Service Providers, or Web Hosting Providers. A service provider is any “business entity that is not a payment brand, directly involved in the processing, storage, or transmission of cardholder data on behalf of another entity.” This includes companies that provide services that control or could impact the security of cardholder data. There is already a requirement in every SAQ to maintain a written agreement with each SP, and have a process for monitoring a Service Provider’s PCI Compliance status. In addition, All SAQ’s now have a place in the Executive Summary to input Service Providers New requirement states a list must be maintained of which PCI DSS requirements are managed by the Service Provider and which by the merchant Changes To PCI Mandate

All companies will have to NAME their service provider when filling out their self assessment questionnaire (SAQ) beginning in January 2015 Clear transfer of risk and exposure to all companies that implement, service or maintain POS systems, IT systems and/or ancillary IP connected equipment/services Service providers are largely the ones that companies look to for help with security and PCI As a service provider, you must look for ways to ensure your risk and exposure is limited Become a PCI compliant service provider Have every implementation and system change “audited” Outsource Changes To PCI Mandate

A Solutions Approach Look to subscription based managed services that ensure continuous network security and PCI compliance as a by product Focus needs to be on protecting sensitive data systems (payments, health records, personal information, etc) along with all other Internet traffic - not just the card data! Cloud-based - No need for clients to invest in expensive equipment, software or additional personnel Certification – There are many managed offerings on the market, but certification (look for PCI L1) will ensure you’re not at risk should a breach occur Feature Rich – A few offer secure WiFi, 3G/4G backup, Content Filtering and many more benefits Breach Protection/Insurance – Extend the ability to offset unfunded risk should a breach occur

THANK YOU