©2015 RSM US LLP. All Rights Reserved. 2015 IASA CAROLINA’S CHAPTER MEETING WAKE FOREST UNIVERSITY CHARLOTTE DECEMBER 14, 2015.

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

National Bank of Dominica Ltd Merchant Seminar Facilitator: Janiere Frank Fraud & Compliance Analyst June 16, 2011.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
.. PCI Payment Card Industry Compliance October 2012 Presented By: Jason P. Rusch.
PCI DSS for Retail Industry
Complying With Payment Card Industry Data Security Standards (PCI DSS)
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
1 U.S. EMV Migration Update and Best Practices Hap Huynh, Senior Director Risk Products April 2015.
Northwest Card Association Acquirer Update January 2012.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
© 2012 Presented by: Preparation For EMV Chip Technology Keith Swiat.
Payment Card PCI DSS Compliance SAQ-D Training Accounts Receivable Services, Controller’s Office 7/1/2012.
Presented by : Vivian Eberhardt, Supervisor Cash and Credit Operations
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Visa Cemea Account Information Security (AIS) Programme
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
Around the World, Around the Corner WorldPay for Small Business.
Kevin R Perry August 12, Part 1: High Level Changes & Clarifications.
EMV’s Impact on U.S. Retailers – It’s Coming! Presented by: Chris Francis VP, Market Development February 21, 2014.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Northern KY University Merchant Training
Payment Card Industry (PCI) Data Security Standard
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
Security & PCI Compliance The Future of Electronic Payments Security & PCI Compliance Greg Grant Vice President – Managed Security Services.
Disclaimer Copyright Michael Chapple and Jane Drews, This work is the intellectual property of the authors. Permission is granted for this material.
PCI DSS The Payment Card Industry (PCI) Data Security Standard (DSS) was developed by the PCI Security Standards Council to encourage and enhance cardholder.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
PCI 3.0 Boot Camp Payment Card Industry Data Security Standards 3.0.
MasterCard Site Data Protection Program Program Alignment.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
PCI requirements in business language What can happen with the cardholder data?
Date goes here PCI COMPLIANCE: What’s All the Fuss? Mark Banbury Vice President and CIO, Plan Canada.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
PCI DSS Readiness Presented By: Paul Grégoire, CISSP, QSA, PA-QSA
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
Walter Conway, QSA 403 Labs, LLC Sneak Preview: What to Expect from PCI DSS v. 2.0  Changes  Clarifications  Guidance.
Agenda EMV – What Is It? EMV In The UK EMV Is Coming To The US
Credit Card Merchant Training PCI Why Now? In October 2015, there will be a fraud liability shift that will affect merchants not able to accept.
Getnationwide.com Let’s Talk about EMV Danielle Rourke.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
TransArmorSM A Secure Transaction ManagementSM Solution
What you need to know about PCI-DSS Jane Drews Chief Information Security Officer Information Security & Policy Office
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Langara College PCI Awareness Training
Chapter 8 Auditing in an E-commerce Environment
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Jon Bonham, CISA, QSA Director, ERC
©2015 RSM US LLP. All Rights Reserved. PCI 3.1 AND 3.2 AND BEYOND Tips and Tricks to Stay PCI Compliant April 14, 2016.
The Unique Alternative to the Big Four ® 25 th Annual Conference of the Association of Local Government Auditors (ALGA) Understanding Payment Card Industry.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Confidential and Proprietary - NOT TO BE DISTRIBUTED WITHOUT THE EXPRESS WRITTEN PERMISSION OF BANK OF AMERICA MERCHANT SERVICES. ASTRA EMV Review/Best.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Washington State Auditor’s Office Third Party Receipting Presented to Washington Public Ports Association June 2016 Peg Bodin, CISA.
© 2014 McGladrey LLP. All Rights Reserved. June 30, 2014 Emergency Medical Services Authority Data portrayed in the attached graphic presentations were.
Payment Card Industry (PCI) Rules and Standards
Summary of Changes PCI DSS V. 3.1 to V. 3.2
Payment Card Industry (PCI) Rules and Standards
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
EMV & Parking – 6 Months On
Internet Payment.
Switchover from Teledeposit to VIRTUAL TERMINAL Moneris Solutions
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Presentation transcript:

©2015 RSM US LLP. All Rights Reserved IASA CAROLINA’S CHAPTER MEETING WAKE FOREST UNIVERSITY CHARLOTTE DECEMBER 14, 2015

©2015 RSM US LLP. All Rights Reserved. HOW CAN PCI BE LEVERAGED TO IMPROVE YOUR CYBERSECURITY PROGRAM December 14, 2015

©2015 RSM US LLP. All Rights Reserved. Objectives What is PCI, why does it exist, and how PCI compliance affects your industry and organization Challenging requirements that could drastically impact your compliance efforts Guidance on how to provide the highest level of security for confidential data while still implementing efficient payment card processes How to gain the most benefit from PCI compliance to protect your whole organization.

©2015 RSM US LLP. All Rights Reserved. Corbin Del Carlo National Leader PCI Services Director, Security and Privacy Services RSM US LLP (847) Introductions 3

©2015 RSM US LLP. All Rights Reserved. “The world isn’t run by weapons anymore, or energy, or money. It’s run by little ones and zeroes, little bits of data. It's all just electrons.” Cosmo - Sneakers 4 The World Has Changed

©2015 RSM US LLP. All Rights Reserved. What drives PCI compliance? Hackers and large international organized crime syndicates Higher monthly fees for non-compliance The fallout of a data breach: -The fallout can be significant, including fines/penalties, termination of your ability to accept payment cards, lost customer confidence, legal costs, settlements and judgments, fraud losses, etc. -A breach could result in a cost of, on average, $200 per card number lost. Knowing what data you have and where it resides

©2015 RSM US LLP. All Rights Reserved. Information Value (marketplaces) 6

©2015 RSM US LLP. All Rights Reserved. Fraud cycle

©2015 RSM US LLP. All Rights Reserved. The PCI DSS  The PCI DSS was introduced to force the implementation of controls at service providers and merchants to protect CHD  The PCI DSS has very specific controls that can be implemented to reduce risk data compromise.  Based on 12 requirements  Roughly 404 sub-requirements which are specific controls to be implemented  Designed with current breach methods in mind and focused on implementing controls that prevent data loss. 8

©2015 RSM US LLP. All Rights Reserved. The PCI DSS (cont)  Required for all organizations that store, process, or transmit CHD.  Compliance deadline for Service Providers was April 30, 2007  Compliance deadline for all organizations was September 30, 2009  Why if the deadline past six years ago do so many organizations still not even know what PCI compliance is?  Compliance vs. Validation 9

©2015 RSM US LLP. All Rights Reserved. We are PCI compliant, we’re done right?  Of Course not…  Many validated complaint organizations were still compromised.  Heartland Payment systems (2008) million cards lost  Hannaford Brothers (2008) – 4.2 million cards lost  RBS Worldpay (2008) – 1.5 million  Global Payments (2012) – 7 million cards  Target (2013) – 40 million cards 10

©2015 RSM US LLP. All Rights Reserved. So what is the problem?  PCI compliance is…  Point in Time  Very limited focus  Contractual not unlawful  Gives a false sense of security  Significant costs create management expectations  Implemented controls create employee frustration (by passing controls)  Security is the Goal of the PCI DSS, but not the outcome 11

©2015 RSM US LLP. All Rights Reserved. How does this effect Insurance industry Lots of recurring payments which can require significant CHD storage Legal or regulatory scrutiny based on publicity of data breach PAN data integrated into multiple business processes -Segmentation difficult to impossible

©2015 RSM US LLP. All Rights Reserved. Scope of assessment -Evidence that card holder data only resides in the card holder data environment. Proof via Data flow documentation Interviews with business process owners Automated scans at perimeter points Proof of data containment Image courtesy of PCI SSC Requirements that organizations struggle with

©2015 RSM US LLP. All Rights Reserved. Requirements that organizations struggle with (cont.) E-Commerce Scoping whitepaper -Published in January Clarifies the scope of PCI DSS in relation to e-commerce apps -Most importantly pulls redirect systems into scope. -SAQ exceptions Images courtesy of PCI SSC Information Supplement – PCI DSS E-Commerce Guidelines

©2015 RSM US LLP. All Rights Reserved. Requirements that organizations struggle with (cont.) Requirement 3.4 Mixture of Hash and Truncation (tokens) -Additional controls are required if both the hashed and the truncated tokens are present in the same system If the organization is using tokens, what are those tokens? See Council’s token guidance 1. Requirement 4.1 -SSL no longer considered a Secure Protocol -TLS - must migrate to TLS 1.2 or have plan to do so by June 2016

©2015 RSM US LLP. All Rights Reserved. Requirement Audit access to CHD -Requirement that all individual user access to CHD must be logged and included in the audit trails -No shared accounts without some other control Requirement 10.6 daily log reviews -Clarified that log reviews should identify suspicious activity or anomalies -Allows risk management strategy to be applied to the logs reviewed -Actually a bit easier but almost (always) requires a SIEM Requirements that organizations struggle with (cont.)

©2015 RSM US LLP. All Rights Reserved. Requirement 9.9 – protect capture devices -All devices that capture payment data (PIN PADs, Card swipes, CHIP readers, etc.) must have unique tamper proof stickers Periodic review of all stickers to validate “not broken or equipment substituted” Requirement 11.3 – Pen-testing methodology -Methodology has to be documented and based on industry standard (such as NIST SP ) and include current threats and vulnerabilities -Has to include the CDE perimeter and critical devices -Has to validate any segmentation or scope reduction controls used to reduce the scope of the assessment -Retention of remediation documentation - Requirements that organizations struggle with (cont.)

©2015 RSM US LLP. All Rights Reserved. Requirement – Vendor Management -Merchant must maintain information of which PCI DSS requirements are managed by each servicer provider or by the entity -Responsibility matrix -MORE than just contractual language -Organization may need to determine if TPSP meets PCI DSS requirements, depending on services provided Requirement 12.9 – vendor acknowledgement -Service providers must provide and merchants must obtain written acknowledgement of responsibilities discussed in 12.8 Requirements that organizations struggle with (cont.)

©2015 RSM US LLP. All Rights Reserved. Matrix example: Requirements that organizations struggle with (cont.)

©2015 RSM US LLP. All Rights Reserved. SAQ’S

©2015 RSM US LLP. All Rights Reserved. SAQ v 3.1

©2015 RSM US LLP. All Rights Reserved. SAQ v 3.1

©2015 RSM US LLP. All Rights Reserved. EMV AND HOW TO REDUCE PCI RISK

©2015 RSM US LLP. All Rights Reserved. EMV – Chip based cards EMV - Europay, MasterCard and Visa October 1, 2015 date to have EMV (Chip) implemented Only Chip and Signature in USA Liability of loss shifts to lower technology Minimal PCI DSS impact -Consider: Chip does not change PAN transmission Are they going directly from POS to processor and not entering the network? -Card Not Present (eComm, Mail In, Phone, Fax) not impacted What are the costs to implement updated PINPAD/POS? Business perspective to update

©2015 RSM US LLP. All Rights Reserved. EMV – Chip and Signature Confirm issuer and processor are ready for accepting Chip and signature Global Operations -Implement global, if you have not already done so -Implement in US P2PE – Point-to-Point Encryption – consider EMV as part of this solution Multiple initiatives: -Some organizations are in process of implementing as part of POS upgrade tasks -Some organizations are waiting to upgrade until it is time to replace POS devices -Some organizations are waiting to see if the date is pushed back for EMV solutions -EMV will move forward as a result of high rate of breaches. US does 24% of global card transactions and is currently the target of 70% of fraud activity.

©2015 RSM US LLP. All Rights Reserved. Tokenization The process of replacing a credit card number with a unique set of numbers that have no bearing on the original data. 26

©2015 RSM US LLP. All Rights Reserved. P2PE -P2PE ensures sensitive credit and debit card data is protected from first card swipe, while in transit to the payment processor where it is securely decrypted -Consider P2PE along with EMV as part of your solution 27

©2015 RSM US LLP. All Rights Reserved. WHAT CAN BE DONE IT’S NOT HOPELESS

©2015 RSM US LLP. All Rights Reserved. How Do I get Started? When I get Back to the Office today? − Review your Information Security Policy/Program − How mature is our incident Response plan − How mature is our Risk Assessment Daily/Weekly − Update anti-virus software & apply patches − Monitor access to critical data 29

©2015 RSM US LLP. All Rights Reserved. How Do I get Started (cont.)? Monthly − Review Daily processes (terms, change management, log reviews) − Check security patches Quarterly − Test security systems and processes − Vulnerability Scanning Yearly − Independent penetration testing − Review and Update DR/IRP Plan − Vendor Security Reviews − Security Awareness Every 3-5 Years − Revisit Security Strategy /Needs (RA) does it really address your threats? 30

©2015 RSM US LLP. All Rights Reserved. 31 Corbin Del Carlo (847)

©2015 RSM US LLP. All Rights Reserved. 32

©2015 RSM US LLP. All Rights Reserved. This document contains general information, may be based on authorities that are subject to change, and is not a substitute for professional advice or services. This document does not constitute audit, tax, consulting, business, financial, investment, legal or other professional advice, and you should consult a qualified professional advisor before taking any action based on the information herein. RSM US LLP, its affiliates and related entities are not responsible for any loss resulting from or relating to reliance on this document by any person. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit rsmus.com/about us for more information regarding RSM US LLP and RSM International. RSM® and the RSM logo are registered trademarks of RSM International Association. The power of being understood® is a registered trademark of RSM US LLP. © 2015 RSM US LLP. All Rights Reserved. RSM US LLP 4725 Piedmont Row Drive Suite 300 Charlotte, NC