SlideShare a Scribd company logo
Facing the Challenges of PCI Compliance Presented by:
The Need
What is credit card compromise? To gain access to: Card Numbers Expiration Dates CVV2/CVC2/CID Track Data An unauthorized individual taking advantage of a flaw in a system that processes, transmits or stores cardholder data.
Theft of Payment Card Data Is Thriving The Perpetrators Script Kiddies International Crime Syndicates Malicious Third Parties Employees The Tools Scanners * Port Vulnerability Web Application * Available online The Gaps Weak Configurations Operating System Flaws Programming Errors Lack of Staff training Flawed Policies Negligence Poor Change Control Application-Induced Backdoors Nearby Systems/Networks Utilize To Find
And It’s Easier Than Many Think Breach investigations have located compromised cardholder data on popular public facing web sites:
Selling Cardholder Information is Lucrative CREDIT  CARDS  NUMBERS  ARE  SOLD   ON THE BLACK- MARKET  FOR  PROFIT Once compromised…
PCI DSS Participants Card Schemes Members (Acquirers) Service Providers Data Storage Entities 3 rd  Party Processors Merchants PCI DSS creation  and maintenance
Six Goals: Twelve Requirements – PCI DSS The “ Digital Dozen ” The Payment Card Industry Data Security Standard  Build and Maintain a Secure Network Install and maintain a firewall configuration to protect cardholder data Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data Protect stored cardholder data Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program  Use and regularly update anti-virus software Develop and maintain secure systems and applications  Implement Strong Access  Control Measures Restrict access to cardholder data by business need-to-know Assign a unique ID to each person with computer access Restrict physical access to cardholder data Regularly Monitor and Test Networks Track and monitor all access to network resources and cardholder data Regularly test security systems and processes Maintain Information  Security Policy Maintain a policy that addresses information security
Non-Compliance: Risks, Fines, Fees, Costs, Loss Non-compliant, compromised business could expect the following:   Damage to their brand/reputation Investigation costs Remediation costs Fines and fees - Non-compliance (each brand issues separate fines) -Re-issuance -Fraud loss Ongoing compliance audits Victim notification costs Financial loss Data loss Charge-backs for fraudulent transactions Operations disruption Sensitive info disclosure Denial of service to customers Individual executives held liable Possibility of business closure
PCI Compliance: Sound Business Practice Fundamental Best Security Practices Avoid fraud Maps that supports other compliance regimes Upholds Brand Name Adds value to name Increases consumer confidence Improves reputation Clarifies Where Data Is Stored Helps to understand own system better
  PCI DSS Compliance Can Protect Against Fines Members receive “ Safe Harbor ” For Compromised Merchants Found  To Be PCI-Compliant  At Time Of Breach

More Related Content

PPT
Critical Security And Compliance Issues In Internet Banking
PPTX
Ecmon 0.5
PPTX
[ON-DEMAND WEBINAR] Understanding SOC2: A SOC 2 Guide for Managed Service Pro...
 
PDF
WITDOM Credit Risk Scoring use case at ISSE 2017
PDF
PCI DSS brochure
PDF
The three chain links of radius security
PPT
Guard Era Security Overview Preso (Draft)
PPT
Clifford wilke
Critical Security And Compliance Issues In Internet Banking
Ecmon 0.5
[ON-DEMAND WEBINAR] Understanding SOC2: A SOC 2 Guide for Managed Service Pro...
 
WITDOM Credit Risk Scoring use case at ISSE 2017
PCI DSS brochure
The three chain links of radius security
Guard Era Security Overview Preso (Draft)
Clifford wilke

What's hot (16)

PPTX
What Data Center Compliance Means for Your Business
PPT
The Increasing Problems Of Controlling Access
PPTX
Website integrity
PPTX
Priviledged Identity Management
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPT
Security In Web Conferencing
PPTX
LTS Secure offers PIM User Activity Monitoring
PDF
Cloud Control Matrix
PDF
Certificate Management Made Easy
PDF
MBM Security Products Matrix
PDF
Tripwire pci basics_wp
PDF
Aggregation Platforms-White Paper
PPTX
Identity theft and data responsibilities
PDF
TroubleTicketing - product presentation
PPT
M014 Confluence Presentation 08 15 06
PPTX
ATLlamas
What Data Center Compliance Means for Your Business
The Increasing Problems Of Controlling Access
Website integrity
Priviledged Identity Management
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Security In Web Conferencing
LTS Secure offers PIM User Activity Monitoring
Cloud Control Matrix
Certificate Management Made Easy
MBM Security Products Matrix
Tripwire pci basics_wp
Aggregation Platforms-White Paper
Identity theft and data responsibilities
TroubleTicketing - product presentation
M014 Confluence Presentation 08 15 06
ATLlamas
Ad

Similar to Chameleon PCI Presentation (20)

PPT
PCI Compliance Seminar
DOCX
PCI DSS 6 Key Objectives You Must Know for Compliance.docx
PDF
PCI Certification and remediation services
PPT
PCI_Security_Awareness12345678904321.ppt
PPT
PCI_Security_Awareness.ppt
PDF
PCI DSS for Pentesting
PPT
Payment Gateway
PPTX
PCI DSS for Penetration Testing
PPT
PCI DSS Compliance and Security: Harmony or Discord?
PPTX
PCI Compliance (for developers)
PPTX
The Easy WAy to Accept & Protect Credit Card Data
PDF
Pcidss qr gv3_1
DOCX
Online_Transactions_PCI
PPTX
PCI Compliance - Delving Deeper In The Standard
PPTX
Sgsits cyber securityworkshop_4mar2017
DOCX
Securing SaaS: Your Roadmap to PCI DSS v4.0 Compliance
PDF
Emerging Trends in Information Security and Privacy
PDF
Whitepaper - Application Delivery in PCI DSS Compliant Environments
PPT
Pci compliance overview earth link business
PDF
What Are the Most Important Security Considerations for Credit Card Payment S...
PCI Compliance Seminar
PCI DSS 6 Key Objectives You Must Know for Compliance.docx
PCI Certification and remediation services
PCI_Security_Awareness12345678904321.ppt
PCI_Security_Awareness.ppt
PCI DSS for Pentesting
Payment Gateway
PCI DSS for Penetration Testing
PCI DSS Compliance and Security: Harmony or Discord?
PCI Compliance (for developers)
The Easy WAy to Accept & Protect Credit Card Data
Pcidss qr gv3_1
Online_Transactions_PCI
PCI Compliance - Delving Deeper In The Standard
Sgsits cyber securityworkshop_4mar2017
Securing SaaS: Your Roadmap to PCI DSS v4.0 Compliance
Emerging Trends in Information Security and Privacy
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Pci compliance overview earth link business
What Are the Most Important Security Considerations for Credit Card Payment S...
Ad

Chameleon PCI Presentation

  • 1. Facing the Challenges of PCI Compliance Presented by:
  • 3. What is credit card compromise? To gain access to: Card Numbers Expiration Dates CVV2/CVC2/CID Track Data An unauthorized individual taking advantage of a flaw in a system that processes, transmits or stores cardholder data.
  • 4. Theft of Payment Card Data Is Thriving The Perpetrators Script Kiddies International Crime Syndicates Malicious Third Parties Employees The Tools Scanners * Port Vulnerability Web Application * Available online The Gaps Weak Configurations Operating System Flaws Programming Errors Lack of Staff training Flawed Policies Negligence Poor Change Control Application-Induced Backdoors Nearby Systems/Networks Utilize To Find
  • 5. And It’s Easier Than Many Think Breach investigations have located compromised cardholder data on popular public facing web sites:
  • 6. Selling Cardholder Information is Lucrative CREDIT CARDS NUMBERS ARE SOLD ON THE BLACK- MARKET FOR PROFIT Once compromised…
  • 7. PCI DSS Participants Card Schemes Members (Acquirers) Service Providers Data Storage Entities 3 rd Party Processors Merchants PCI DSS creation and maintenance
  • 8. Six Goals: Twelve Requirements – PCI DSS The “ Digital Dozen ” The Payment Card Industry Data Security Standard Build and Maintain a Secure Network Install and maintain a firewall configuration to protect cardholder data Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data Protect stored cardholder data Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program Use and regularly update anti-virus software Develop and maintain secure systems and applications Implement Strong Access Control Measures Restrict access to cardholder data by business need-to-know Assign a unique ID to each person with computer access Restrict physical access to cardholder data Regularly Monitor and Test Networks Track and monitor all access to network resources and cardholder data Regularly test security systems and processes Maintain Information Security Policy Maintain a policy that addresses information security
  • 9. Non-Compliance: Risks, Fines, Fees, Costs, Loss Non-compliant, compromised business could expect the following: Damage to their brand/reputation Investigation costs Remediation costs Fines and fees - Non-compliance (each brand issues separate fines) -Re-issuance -Fraud loss Ongoing compliance audits Victim notification costs Financial loss Data loss Charge-backs for fraudulent transactions Operations disruption Sensitive info disclosure Denial of service to customers Individual executives held liable Possibility of business closure
  • 10. PCI Compliance: Sound Business Practice Fundamental Best Security Practices Avoid fraud Maps that supports other compliance regimes Upholds Brand Name Adds value to name Increases consumer confidence Improves reputation Clarifies Where Data Is Stored Helps to understand own system better
  • 11.   PCI DSS Compliance Can Protect Against Fines Members receive “ Safe Harbor ” For Compromised Merchants Found To Be PCI-Compliant At Time Of Breach