Payment Card Industry Data Security Standard AAFA ISC/SCLC Fall 08.

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

National Bank of Dominica Ltd Merchant Seminar Facilitator: Janiere Frank Fraud & Compliance Analyst June 16, 2011.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
.. PCI Payment Card Industry Compliance October 2012 Presented By: Jason P. Rusch.
The Payment Card Industry Data Security Standard (PCI DSS)
PCI DSS for Retail Industry
Payment Card Industry Data Security Standard Tom Davis and Chad Marcum Indiana University.
UCSB Credit Card Processing and PCI Compliance
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
PCI:DSS What is it, and what does it mean to you? Dale Pearson 17 th November 2009.
Merchant Card Processing (PCI Compliance for Supervisors) Sponsored by UW-Platteville’s Financial Services and The Office of Information Security.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Property of CampusGuard Compliance With The PCI DSS.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Jeff Williams Information Security Officer CSU, Sacramento
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Northern KY University Merchant Training
Payment Card Industry (PCI) Data Security Standard
Security & PCI Compliance The Future of Electronic Payments Security & PCI Compliance Greg Grant Vice President – Managed Security Services.
Web Advisory Committee June 17,  Implementing E-commerce at UW  Current Status and Future Plans  PCI Data Security Standard  Questions.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
The ABC’s of PCI DSS Eric Beschinski Relationship Manager Utility Payment Conference Kay Limbaugh Specialist, Electronic Bills & Payments &
PCI DSS Managed Service Solution October 18, 2011.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
PCI DSS Readiness Presented By: Paul Grégoire, CISSP, QSA, PA-QSA
Introduction to Payment Card Industry Data Security Standard
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Information Security 2013 Roadshow - PCI. Roadshow Outline  What IS PCI  Why we Care about PCI  What PCI Means to You and Me.
Payment Card PCI DSS Compliance SAQ-B Training Accounts Receivable Services, Controller’s Office 7/1/2012.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Introduction to PCI DSS
Payment Card Industry (PCI) Rules and Standards
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
Internet Payment.
Breaches by Merchant Type
Session 11 Other Assurance Services
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
PCI Compliance : Whys and wherefores
PCI DSS Erin Carrick.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Contact Center Security Strategies
Utility Payment Conference
Presented by: Jeff Soukup
Presentation transcript:

Payment Card Industry Data Security Standard AAFA ISC/SCLC Fall 08

PCI DSS What is it? A set of standards developed by the major credit card companies as a guideline to help organizations that process credit cards prevent credit card fraud and various other security vulnerabilities and threats.

Why should I care? If you process, store, or transmit payment card data you should be compliant (credit card companies expect it) Non compliant companies who process payment card transactions run the risk of: Losing their ability to process credit card payments Increased transaction rates Audits Fines Or Worse!…

Why should I care? Approx 100 million credit and debit card numbers were stolen by computer hackers 455,000 customers who returned merchandise without receipts had their personal data stolen including drivers license numbers. Thieves used this data to acquire $1 million in merchandise with gift cards from Wal-Mart and Sams Club AP - March 29, 2007

Why should I care? Forrester estimate (4/15/08) - $1.35 billion Facing possible class actions lawsuits from customers Offering 3 years of free credit monitoring for 455,000 customers Compensating customers to replace drivers licenses if their number is the same as their social security number Lost customer confidence and trust Decrease in stockholder faith Loss of revenue AP - March 29, 2007 Failure to comply could be costly!

Why should I care? TJ Maxx not alone Will your company be next?

Whats required to be compliant? Under the current standard (version 1.2), there are 12 requirements organized into 6 logically related groups called control objectives Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy

Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters

Protect Cardholder Data Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across open, public networks

Maintain a VulnerabilityManagement Program Requirement 5: Use and regularly update anti-virus software Requirement 6: Develop and maintain secure systems and applications

Implement Strong Access Control Measures Requirement 7: Restrict access to cardholder data by business need-to-know Requirement 8: Assign a unique ID to each person with computer access Requirement 9: Restrict physical access to cardholder data

Regularly Monitor and Test Networks Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes

Maintain an Information Security Policy Requirement 12: Maintain a policy that addresses information security

Myth #1: Breaches only happen to big-box retailers Fact: Small- to medium-sized merchants are highly vulnerable and a frequent target. Based on most of the news coverage, security breaches may seem to happen only to huge corporations – such as the TJX security breach. But, in reality, cardholder data compromises affect small online store owners far more frequently. Why? Because, the sheer number of them (according to Visa more than 6 million) makes them a more frequent target. Also, they are typically the least sophisticated technologically making them an easier target for hackers and carders.

Myth #2: PCI compliant merchants cannot be breached. Fact: While it is a critical step, PCI DSS compliance is only a periodic measurement at a point in time – not a guarantee. Just ask Hannaford Brothers groceries if PCI compliant merchants cant be breached. They were thought to be PCI compliant, but were still affected by a very public breach. Theres a danger that organizations can develop tunnel vision dealing with PCI at the expense of building a sound security program. Companies should develop a consistently high security posture, and in doing so, they will achieve PCI compliance. Any system involving people is vulnerable, either from accidental error or intentional acts of theft.

Myth #3: E-commerce merchants that use PCI compliant shopping carts or payment gateways are by default PCI compliant. Fact: This may be the case, but PCI guidelines cover not only data security but also the physical security and the existence of written security policies. Once a year, regardless of how the merchant handles card data, every merchant is required to complete an self assessment questionnaire, to complete the relevant Attestation of Compliance and, in most case, to submit the SAQ and the Attestation of Compliance to their acquirer. While it is important that terminals, gateways and shopping carts are compliant, that doesnt guarantee that merchants are secure from a physical standpoint or that they have employee training programs or security policies in place. SAQ A was specifically developed for merchants who outsource to a secure terminal.

Myth #4: PCI compliance is too expensive. Fact: Non-compliance can be very expensive if not catastrophic. Non-compliance doesnt just result in costs associated with fines, credit card replacement and audit fees, but also from loss of business reputation and revenue. In fact a recent study stated that 70 percent of the cost of non-compliance was loss of revenue. This is significant for big companies that are crucified in the press, but may be catastrophic for small vendors, putting them out of business.

Myth #5: PCI compliance is getting easier. Fact: The PCI Security Standards Council is working hard to clarify and simplify the standard. For example, in October 2008, the Council released version 1.2 of the Self-Assessment Questionnaire (SAQ), which now consists of four versions of the SAQ instead of the previous one-size-fits-all approach. While the attempt to segment merchants by validation type is a big step forward, it still presents confusion among many small merchants who are unclear on which SAQ they should complete. For small merchants in particular, protecting card holder data and maintaining a secure environment remains a complex endeavor.