Practical IT Research that Drives Measurable Results Develop a PCI DSS Compliance Strategy.

Slides:



Advertisements
Similar presentations
Payment Card Industry Data Security Standard AAFA ISC/SCLC Fall 08.
Advertisements

ISACA January 8, IT Auditor at Cintas Corporation Internal Audit Department Internal Security Assessor (ISA) Certification September 2010 Annual.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
.. PCI Payment Card Industry Compliance October 2012 Presented By: Jason P. Rusch.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
This refresher course will:
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Smart Payment Processing ™ Protecting Your Business from Card Data Theft Presenter: Lucas Zaichkowsky.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
Visa Europe Implementing PCI DSS Requirements Within Your Organisation September 2008 Simon Breeden.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Around the World, Around the Corner WorldPay for Small Business.
Northern KY University Merchant Training
Travillon Consultants
Security & PCI Compliance The Future of Electronic Payments Security & PCI Compliance Greg Grant Vice President – Managed Security Services.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
PCI DSS The Payment Card Industry (PCI) Data Security Standard (DSS) was developed by the PCI Security Standards Council to encourage and enhance cardholder.
MasterCard Site Data Protection Program Program Alignment.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
PCI DSS Managed Service Solution October 18, 2011.
Visa Europe Confidential PCI DSS Protecting your business Lara Fiorani, Visa Europe Basel 25 April, 2006.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Electronic Records Management: What Management Needs to Know May 2009.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
PCI DSS Readiness Presented By: Paul Grégoire, CISSP, QSA, PA-QSA
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan The University of Texas at Dallas.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Balance Between Audit/Compliance and Risk Management- Best Practices FIRMA 21 st National Training Conference Julia Fredricks, U.S. Chief Compliance Officer.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
TransArmorSM A Secure Transaction ManagementSM Solution
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Langara College PCI Awareness Training
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 1: Information Security Fundamentals Security+ Guide to Network Security Fundamentals Second Edition.
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Compliance is Pretty Important, I Guess Florida Gulf Coast ARMA Meeting.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Practical IT Research that Drives Measurable Results Get Started Bringing Order to Help Desk Request Chaos.
Info-Tech Research Group Practical IT Research that Drives Measurable Results Reduce Telecom Expenses.
Plan for Application Consolidation. Successful application consolidation relies on assessment of the application portfolio to determine the best candidates.
Practical IT Research that Drives Measurable Results Establish an Effective IT Steering Committee.
Info-Tech Research Group1 Headline / Subhead Vertical Spacing V3.1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: Enterprise Content Management Suite ECM: A vendor marketing concept, not an.
Breakout Session 3 QHSE Strategic Risk Management.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Regulatory Compliance
Breaches by Merchant Type
My First Template.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
MIS 5121 Real World Control Failure
Card Data Fraud.
Presentation transcript:

Practical IT Research that Drives Measurable Results Develop a PCI DSS Compliance Strategy

Introduction All organizations that deal with processing payment card data must be aware of PCI DSS standards and how they apply to their scenario in order to mitigate risk of litigation and fraud. While most Small and Midsize Businesses (SMBs) will not come under pressure to adopt full compliance in the coming year, everyone should begin adopting processes that are in line with PCI DSS standards. These will include: Re-evaluating how cards are processed. Weighing the value of using/storing card data versus the cost of protecting it. Developing a strategy that focuses on security first, compliance as needed.

Executive Summary The Payment Card Industry Data Security Standard (PCI DSS) is designed to validate security measures by defining a standard for the way sensitive payment card data is handled. However, compliance does not guarantee security and the end goal of an organizational effort should be to protect sensitive data. Enterprises can save a lot of money by NOT blindly adopting PCI standards. Instead: 1.Simplify. Move away from POS systems that store payment card data. 2.Outsource. Use third party portals and bank operated POS systems that connect to compliant processors. 3.Leverage the PCI-DSS Prioritized Approach. The reality is that small and midsized enterprises will not be fully compliant overnight. The prioritized approach recommends focusing on certain key processes and controls ahead of others.

Understand PCI DSS Assess Pressures and Risks Develop a Data Security Strategy

PCI DSS is built on twelve domains designed to protect sensitive data There are 225 controls covered in the PCI DSS. Adherence to the standards is enforced by members (Visa, MC, Amex, Discover and JCB) or their designated banks acting as proxies. Enforcement has not been consistent across various financial institutions. For an audio-visual rundown of the twelve domains visit the PCI institute here.here

Compliance with PCI DSS doesn’t necessarily make you secure Waiting for the light to turn green before crossing the street puts you in compliance with traffic laws, but it doesn’t necessarily keep you safe. Just because the light is green, doesn’t mean you cross with your eyes closed. Enterprises who focus on having documentation in place only for the sake of passing audit are putting themselves and their customers at risk. PCI DSS is a set of standards designed specifically to protect payment card data ” PCI DSS is not Government enforced law. Equally enforced across the retail industry. A holistic security standard. PCI DSS does not Guarantee against hackers! Limit litigation against the enterprise! PCI DSS doesn’t prevent you from getting hacked. It just gives you a warm, fuzzy, sense. It feels good, but I don’t know how much good it does. Head of IS, Public Sector “

Appeasing auditors is not as challenging as truly securing client data More PCI DSS compliers succeeded with compliance than data security IT leaders interviewed by Info-Tech agreed that leveraging a compliance mandate helped gain buy-in from executives for security investments that they would not have previously received. However, data shows that project efforts for many clients seemed focused on passing audits and not necessarily improving enterprise security. 300% more enterprises succeeded with compliance than with security!

In 2009, HPS announces a massive network-wide data breach by malicious software. The data breach was not well understood. HPS could not answer: o How long it had been breached. o How it had been breached. o How much damage had been done. 130 million credit and debit cards compromised. Cost of breach has already exceeded $140 million. HPS stock drops 40% on news of breach, loses $1 billion in market capitalization. HPS was PCI compliant at one point, though not at time of breach. End-to-end data encryption was not in place. Qualified Security Assessors (QSA) audits were in place but failed to detect common attack pattern of malicious software. Compliance for the sake of passing audit failed to save Heartland Payment Systems from the largest data breach ever Heartland Payment Systems (HPS) is the sixth largest credit card payment processor in the US, processing transactions for 250,000 businesses, with 100 million transactions per month We certainly didn't understand the limitations of PCI and the entire assessment process. PCI compliance doesn't mean secure. -Robert Carr, CEO of Heartland Payment Systems Situation & Impact “ ”

Enterprises that don’t protect sensitive data are subject to prosecution under federal privacy laws PCI DSS compliance is not the law; it is in the hands of member payment cards such as Visa and associated banks to enforce the standard. Enterprises that fall under health, finance and government sectors may actually be compelled to adopt PCI standards due to the correlation between card data and identify theft. While PCI DSS is not heavily enforced by the payment card industry, the controls it represents can mitigate risk of federal prosecution and private law suites. Right to Financial Privacy Act of 1978 (RFPA) Gramm-Leach-Bliley Financial Services Modernization Act of 1999 (GLBA) Family Education Rights and Privacy Act of 1974 Fair and Accurate Credit Transactions Act (FACTA) of 2003 Electronic Communications Privacy Act of 1986 (ECPA) FERPA; (also know as the Buckley Amendment) Electronic Freedom of Information Act of 1996 (E-FOIA) With credit card data on hand, hackers are only a step away from full identity theft. Concerned about legal obligations? Click links below for more details about these Federal privacy laws “ ” IT Security Expert

In 2007 TJX, America’s largest off-price apparel chain, discovers that its systems were compromised for 18 months undetected. 80GB of credit card data was stolen from over 90 million customer cards. Costs from the breach reached $250 million within one year, ($202 million in litigation alone). Lawsuits, fines, and claims have plagued the chain since. Enterprises, not their banks, must assess the risks and consequence of a breach All organization processing payment cards should have some understanding of PCI DSS because: Banks will go after merchants when the merchant’s potential losses becomes a risk to the bank – enterprises must assess their own risk to protect their reputation and to avoid losses due to fraud and litigation. Though only tier one merchants are currently being held accountable to the standard (by banks), the industry may extend it’s reach to smaller vendors over time, with audits to merchants who fall into the self-assessment category. TJ Maxx From a compliance standpoint, this is taken very seriously because it’s brand reputation and damage to the overall brand. A theme that’s turning internally is, ‘We don't want to be another T.J. Maxx. Director Information Protection and Risk Mitigation, Retail industry “ ”

Info-Tech Helps Professionals To: Sign up for free trial membership to get practical Solutions for your IT challenges “Info-Tech helps me to be proactive instead of reactive - a cardinal rule in stable and leading edge IT environment.” - ARCS Commercial Mortgage Co., LP