40
About the i2Coalition A global voice for the people and companies building the nuts and bolts of the Internet More than 65 members, including hosts, data centers, cloud providers, registrars and more Founded in 2012 to advocate on issues, connect members, and share best practices

Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Embed Size (px)

DESCRIPTION

The Internet Infrastructure Coalition (i2Coalition) supports those who build the nuts and bolts of the Internet, and we treat it like the noble profession that it is. We believe the continued growth of the Internet is vital for growing an environment of innovation and seek to engage in ways to foster success of the Internet and Internet infrastructure industry. We seek to influence decision makers to weigh decisions on whether they are good or bad for the Internet economy and its foundational industries. In short, we seek to foster growth within the Internet infrastructure industry by driving others to harness the Internet’s full potential. To learn more about i2Coalition, visit www.i2Coalition.com.

Citation preview

Page 1: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

About the i2Coalition• A global voice for the people and companies building the nuts and bolts of the Internet

• More than 65 members, including hosts, data centers, cloud providers, registrars and more

• Founded in 2012 to advocate on issues, connect members, and share best practices

Page 2: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Best Practices Working Group• The i2Coalition works with members to develop and share best practices on a range of topics.

• Our industry has been and will continue to be at the forefront of fighting piracy, fraud, child pornography, and other Internet-based legal offenses.

• We want to make the Internet a better, safer place for all.

Page 3: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Contact UsLearn more about joining or working with the i2Coalition.

www.i2coalition.com

[email protected]

Page 4: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

PCI Updates: Securing the future of payments

Bob Russo, General Manager2014

Page 5: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Everyone is Aware of Breaches!

Page 6: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Custom Malware

Advanced Persistent Threats

Trojan Horses

WormsViruses

Evolution of Cyber Attacks

Page 7: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Modern Malware Hides Itself

Page 8: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

About the PCI Council

Founded in 2006 - Guiding open standards for payment card security

• Development• Management• Education• Awareness

Page 9: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Manufacturers

PCI PTSPin Entry Devices

Ecosystem of payment devices, applications, infrastructure and users

Software Developers

PCI PA-DSSPayment

Applications

PCI Security& Compliance

P2PE

Merchants & Service Providers

PCI DSSSecure

Environments

PCI Security Standards SuiteProtection of Cardholder Payment Data

Page 10: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

The Formula for PCI Success

+

PeopleProcessesTechnology Security

+ =

Page 11: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

92% 97%

With version 3.0, PCI DSS is more mature than ever, and covers a broad base of technologies and processes such as encryption, access control, and vulnerability scanning to offer a sound baseline of security.

PCI Standards Help Secure Your Data

Source: 2013 Trustwave Global Security Report

PCI DSS has made comprehensive security controls more commonplace in larger organizations. Therefore, the organizations become more difficult to compromise.

Page 12: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

The Standards Continually Evolve

Page 13: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Weak or default passwords

Lack of employee education

Security deficiencies introduced by third parties

Slow self-detection

Top Mistakes Revealed by Forensic Audits

Source: 2013 Trustwave Global Security Report

Page 14: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

PCI DSS, PA-DSS 3.0 – Key Themes

Make PCI your compass, not your roadmap

Education Awareness

Flexibility

Security as a Shared

Responsibility

Page 15: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Effective Dates for v3.0 PCI DSS

Version 3.0 became effective on 1 January 2014

Version 2.0 is valid until 31 December 2014

Supporting documents now available

Feedback period begins November 2014

Download PCI DSS 3.0 and supporting documents at pcisecuritystandards.org

Page 16: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

EMV Chip in US – It’s Almost Here…

Page 17: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

You May Have Heard…

EMV Chip will solve all security problems

Card payments will be revolutionized with EMV Chip

The payment landscape will be transformed, no need for PCI

PCI is on its way to extinction

Page 18: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

PCI Helps Secure Card Data Across All Channels

EMV Chip Helps Reduce Face-to-Face Fraud

Even EMV Chip Needs PCI

Page 19: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

PCI PIN Transaction Security Listing https://www.pcisecuritystandards.org/approved_companies_provide

rs/approved_pin_transaction_security.php

Upgrade Your Terminal

Page 20: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Don’t Forget About E-Commerce

PCI DSS E-Commerce Guidelineswww.pcisecuritystandards.org/pdfs/

PCI_DSS_v2_eCommerce_Guidelines.pdf

Page 21: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Looking Forward …

PCI Standards will

continue to evolve…

And will be applied as

required, such as with EMV

chip

Page 22: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Mobile

retail

$19paymen

t

accepte

dThank

You!

PCI SSC is working with industry

PCI Standards focus on merchant-acceptance

Mobile payment acceptance still evolving

Understand risk and use PCI SSC resources

PCI SSC is working with industry

Page 23: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Mobile Guidelines and Best Practices

Guidelines published 2012-2013

• PCI Mobile Payment Acceptance Guidelines for Developers

• PCI Mobile Payment Acceptance Guidelines for Merchants as End-Users

• Accepting Mobile Payments with a Smartphone or Tablet

Page 24: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Reducing the cardholder data footprint

efficient security

complicated for PCI DSS

More

Less

Page 25: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Where the Footprint Begins

66% of data breaches, the organization didn’t know the data was on the compromised systemVERIZON DATA BREACH INVESTIGATIONS REPORT

Page 26: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Ways to Reduce Footprint

Business process for retention

Tokenization

P2PE

Reduce the need or ability to store or transmit cardholder data

Page 27: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Point-to-Point Encryption

Page 28: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

What is a PCI P2PE Solution?

PCI PIN Transaction Security (PTS) approved devices with Secure Reading and Exchange of Data (SRED)

PCI P2PE validated applications and processes

Listed by PCI SSC

Page 29: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

P2PE and Merchants

Merchants and their acquirers accept the risk when using encryption solutions not listed by the Council

Only PCI-listed P2PE solutions are recognized as meeting requirements for reducing merchant PCI DSS scope

Page 30: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Tokenization

PAN

Tokenization

Tokenization can remove or render payment card data useless to cybercriminals and work in concert with PCI Standards to increase the security of this data.

Page 31: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

The Formula for PCI Success

+

PeopleProcessesTechnology Security

+ =

Page 32: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

PreparationWhat are your personal PCI education goals for the next three years?

For your staff

For yourself

Page 33: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

People in Payment Chain Cause Most Internal Breaches!

Page 34: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Be Aware! Get Educated!

Lack of employee education and awareness is a lead contributor to data breaches

Insider’s Guide•Defines/explains updates to PCI DSS 3.0 in 90 minutes

PCI Essentials• Payment

security basics

www.pcisecuritystandards.org/training

Laura Johnson
Need Linda's input on red bullets
Page 35: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Training Highlights

Online Internal Security Assessor (ISA) Training

P2PE Assessor Training

Corporate Group Training– Let Us Come To You!

Online Awareness Training in Four Hours

Qualified Integrators and Resellers (QIR)™ Program

PCI Professional Program (PCIP)™To learn more, visit: www.pcisecuritystandards.org/training

Page 36: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

New! Quick Resources for card security

www.pcisecuritystandards.org/news_events/quick_resources.php

Page 37: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Get Involved – We Need Your Input

Join Learn Input Network

Nominate Vote Share Influence

Page 38: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Be Part of SIGs

Security Awareness Penetration TestingGuidance

Page 39: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Save the Dates – 2014 Community Meetings

North America

9-11 September Orlando, Florida

Europe

7-9 OctoberBerlin, Germany

Asia-Pacific

18-19 NovemberSydney, Australia

Page 40: Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautions and Mitigate Risk

Guiding open standards for global payment card security

Please visit our website at www.pcisecuritystandards.org

Questions?