CONFIDENTIAL 1 Preparing for & Maintaining PCI Compliance.

Slides:



Advertisements
Similar presentations
Chapter 8 Payment Systems: Getting the Money
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
FMS. 2 Fires Terrorism Internal Sabotage Natural Disasters System Failures Power Outages Pandemic Influenza COOP/ Disaster Recovery/ Emergency Preparedness.
E-Child Care Time and Attendance Tracking System December 17, 2010 Department of Human Services, Division of Family Development 1.
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Learning Objectives Understand the shifts that are occurring with regard to online payments. Discuss the players and processes involved in using credit.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
The Enterprise Business Center. #2 CyberSource Enterprise Business Center your payment processing dashboard ******** Log out security feature All tools.
Navigating the New SAQs (Helping the 99% validate PCI compliance)
Author: Michael Adeyeye Department of Electrical and Information Engineering, Covenant University, Ota, Nigeria Presented by: Merlene Headley & Rudi McClean.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Credit / Debit Card Electronic Payments Industry Update on Convenience Fees, Utility Program and More! Presented by: Presented by: Michael Hodge, Regional.
Chapter 10: Auditing the Expenditure Cycle
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
1 Consolidated Billing Project UCSB / UCLA Financial Systems Conversion Project Web Management, Hosting and Consulting Service February 8, 2011 CITI.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Summary of Reading Assignments: Credits and Debits on the Internet & New Payment Systems Hope To Cash In Dr. Deepak Khazanchi.
Risk Management. Risk Categories Strategic Credit Market Liquidity Operational Compliance/legal/regulatory Reputation.
“Electronic Payment System”
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
E-Commerce, Business Methods and Evaluation of Payment Methods in Nigeria Written by Michael Adeyeye Department of Electrical and Information Engineering,
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Potential of E-commerce Worldwide Market Number of Internet users mid million now378 million Value of e-Commerce revenue 2000US$657 billion.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
Ecommerce Applications 2007/8 Session 61 E-commerce Applications Process views.
GENERAL BANK MANAGEMENT Technology Management
Internet Security for Small & Medium Business Week 6
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
Presentation Title Here
VirtualMerchant Secure Hosted Software Solution. Introducing VirtualMerchant  Complete hosted payment solution that instantly transforms PCs into “virtual”
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
What you need to know about PCI-DSS Jane Drews Chief Information Security Officer Information Security & Policy Office
Access Control / Authenticity Michael Sheppard 11/10/10.
Introduction to eTIM. Introduction to eTIM eTIM Overview   eTIM (eTIM) is a server designed and developed by VeriFone, Inc. to work between PAYware.
RiTA Server A New Era in Payment Processing!. 2 Mission Statement  To strengthen and defend our position as the trusted worldwide leader of the electronic.
Chapter 8 Auditing in an E-commerce Environment
Introduction  Internet. Internet  E-commerce. E-commerce.
銀行及財務金融機構之資訊安 全防護指導方針 -ISO 普華資安股份有限公司 資訊安全諮詢顧問 蔡興樺.
TODAY’S AGENDA 1.Budgeting Project review- they are due electronically tomorrow 2.Budgeting Quiz (DVD) and test questions afterwards 3.Ch. 10 Baking 4.Ch.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
Electronic Banking & Security Electronic Banking & Security.
Leading Edge Innovations EWA BERESNIEWICZ-KOZLOWSKA.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Session 11 Other Assurance Services
Switchover from Teledeposit to VIRTUAL TERMINAL Moneris Solutions
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
GENERAL BANK MANAGEMENT Technology Management
Presentation Title Here
Presentation Title Here
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Presentation Title Here
County HIPAA Review All Rights Reserved 2002.
Presentation transcript:

CONFIDENTIAL 1 Preparing for & Maintaining PCI Compliance

CONFIDENTIAL 2 Topics of Discussion About Link2Gov Establishing security policy and e-commerce infrastructure Preparing for the audit Facility and resource requirements during the audit Responsiveness to findings Maintaining security standards following audit Marketing PCI compliance Questions

CONFIDENTIAL 3 About Link2Gov Our mission is to be the premier provider of integrated IP payment services using web, telephony, point of sale and other transaction technologies.

CONFIDENTIAL 4 About Link2Gov Payment methods include: –Credit Cards –ATM/Debit Cards (PIN-Secured) –Check Cards (Signature-Debit) –Electronic Checks (Conversion, Verification and Guarantee) Payment channels include: –Point-of-Sale (POS) –Internet –Interactive Voice Response (IVR) –Mail and Kiosks

CONFIDENTIAL 5 About Link2Gov IP Gateway Virtual Terminal: LINK2POS Network Controlled VeriFone POS Terminals Web & IVR Application Generator & Hosting Consolidated Real-Time Internet Reporting Flexible Funding Models

CONFIDENTIAL 6 Establishing security policy and e-commerce infrastructure Ecommerce Infrastructure Documentation Implementation Enforcement Policy

CONFIDENTIAL 7

8 Preparing for the audit Yearly Changes Computer Security Test Plan Review Configuration Management Plan Risk Assessment Plan Disaster Recovery Plan Trusted Facilities Manual

CONFIDENTIAL 9 Facility and resource requirements during the audit Staffing Travel Infrastructure

CONFIDENTIAL 10 Responsiveness to findings Reviewing Findings Verify Results False Positives Exceptions Implementation –Configuration Management

CONFIDENTIAL 11 Maintaining security standards following audit Security Policy Documentation Enforcement –Audit Trail –System Logs –Accounting Change Control

CONFIDENTIAL 12 Marketing PCI compliance Cost Avoidance Through L2G Products –Pass Thru –Web / IVR Security Validation by Third Party Certifications

CONFIDENTIAL 13 Questions