SlideShare a Scribd company logo
PCI 2010: Trends & Technologies Presented by: Dr. Anton Chuvakin Author of the book “ PCI Compliance” Principal at  www.securitywarriorconsulting.com/
Agenda Why PCI? Key Question PCI “State of the Union” “ PCI War” Future of PCI?
Why is PCI Here? Criminals need money  Credit card = money Where are the most cards? In computers. Data theft grows and reaches HUGE volume Some organizations still don’t care …  … . especially if the loss is  not theirs Payment card brands enforce DSS!
PCI DSS is based on fundamental data security practices What is PCI DSS: DSS + Regime Protect stored data Encrypt transmission of cardholder data and sensitive information across public networks Protect Cardholder Data Maintain a policy that addresses information security Maintain an Information Security Policy Track and monitor all access to network resources and cardholder data Regularly test security systems and processes Regularly Monitor and  Test Networks Restrict access to data by business need-to-know Assign a unique ID to each person with computer access Restrict physical access to cardholder data Implement Strong Access Control Measures Use and regularly update anti-virus software Develop and maintain secure systems and applications Maintain a Vulnerability Management Program Install and maintain a firewall confirmation to protect data Do not use vendor-supplied defaults for system passwords  and other security parameters Build and Maintain a  Secure Network
Ceiling vs Floor PCI  is  the  “floor” of security However, many prefer to treat it as  a “ceiling” Result:  security breaches
Laggards vs Leaders Issue : many merchants don’t even want to “grow up”  to  the   floor . Action : breaches, fines, “motivation”, guidance, etc Result : security improves!
PCI War: Security vs Compliance Issue : some argue that PCI lowers  the ceiling  of security Truth : PCI doesn’t lower security, YOU do Result : breach is your fault!
Myth 7 – PCI Is Enough Security  (from “PCI Myths and Misconceptions” by Anton Chuvakin) Myth :  PCI is all we need to do  for security “ We are secure, we got PCI!” “ We worked hard and we passed an ‘audit’; now we are secure!” Reality:  Again, PCI is  basic  security, it is a  necessary, NOT sufficient .  PCI is also about  cardholder data security , not the rest of private data, not your intellectual property, not SSNs, etc. It also covers  confidentiality , and NOT integrity and availability of data.
PCI and Security Today <- This is the enemy! This is NOT the enemy! -> Remember:   security first , compliance as a result.
PCI 2010 Battle for Level3s and Level4s continues :  security increases, transaction risk decreases New technologies make payment security easier : tokenization, E2EE, DLP ( who pays? ) Outsource to those who know : don’t  fail  on your own Cybercrime still rampant : focus on security! Remember :  ongoing compliance  vs point-in-time validation
Quick PCI Action Items Less card data -> less work needed!!!  (Yes, 3 times   ) PCI is common sense, basic data security;  stop complaining about it  - start doing it! After validating that you are compliant, don’t stop:  continues compliance AND security is your goal , not “passing an audit”
Get More Info! “ PCI Compliance” by Anton Chuvakin and Branden Williams Useful reference for merchants, vendors – and everybody else Out in  December 2009!
About Anton Chuvakin Dr. Anton Chuvakin  Email:   [email_address]   Site:   http://www.chuvakin.org   Blog:   http://www.securitywarrior.org   LinkedIn:   http://www.linkedin.com/in/chuvakin   Twitter:   @anton_chuvakin Consulting :  www.securitywarriorconsulting.com For more:  http://www.chuvakin.org
More on Anton Book author:  “Security Warrior”, “PCI Compliance”, “Information Security Management Handbook”, “Know Your Enemy II”, “Hacker’s Challenge 3”, etc Conference speaker:  SANS, FIRST, GFIRST, ISSA, CSI, Interop , many, many others worldwide Standard developer:  CEE, CVSS, OVAL, etc Community role:  SANS, Honeynet Project, WASC, CSI, ISSA, OSSTMM, InfraGard, ISSA, others Past roles:  Researcher, Security Analyst, Strategist, Evangelist, Product Manager, now Consultant
Anton’s Security Warrior Consulting Services Logging and log management policy Develop logging policies and processes , log review procedures, workflows and periodic tasks as well as help architect those to solve organization problems  Plan and implement log management architecture  to support your business cases; develop specific components such as log data collection,  filtering, aggregation, retention, log source configuration as well as reporting, review and validation Customize industry “best practices”  related to logging and log review  to fit your environment,  help link these practices to business services and regulations Help  integrate logging tools  and processes into IT and business operations Content development Develop of correlation rules, reports  and other content to make your SIEM and log management product more useful to you and more applicable to your risk profile and compliance needs Create and refine policies, procedures and operational practices  for logging and log management to satisfy requirements of PCI DSS, HIPAA, NERC, FISMA and other regulations More at  www.SecurityWarriorConsulting.com

More Related Content

PPT
PCI DSS Myths 2009: Myths and Reality
PPT
Bengt Berg, Cybercom Security, Polen
PDF
Privacy and Security by Design
PPT
Verderber Rothke What’s New With PCI
PPTX
Continuous Compliance 14.9.2016
PPTX
Privacy by Design - taking in account the state of the art
PDF
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
PDF
10 Practical Tips to Prepare for the New Privacy Shield Era
PCI DSS Myths 2009: Myths and Reality
Bengt Berg, Cybercom Security, Polen
Privacy and Security by Design
Verderber Rothke What’s New With PCI
Continuous Compliance 14.9.2016
Privacy by Design - taking in account the state of the art
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
10 Practical Tips to Prepare for the New Privacy Shield Era

What's hot (20)

PPTX
Mobile Devices and Internet of Things
PPTX
Privacy by Design: White Papaer
PDF
Blockchain for Accounting & Assurance
PPTX
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
PPTX
The CISO’s Guide to Data Loss Prevention
PPTX
Privacy frameworks 101
PPT
Anton Chuvakin on Security Data Centralization
PPTX
GDPR project board deck (example)
PDF
Convince your board: How to prepare your business for List X
PDF
Windstream Managed Network Security Ebook
PPT
[null] Iso 27001 a business view by Sripathi
PDF
Windstream Managed Network Security Infographic
PPTX
Keep your data safe and be compliant via a 360° approach
PPTX
GDPR Part 2: Quest Relevance
PPTX
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
PDF
Signs It's Time to Modernize Your Identity Management Software
PDF
PCI DSS introduction by khaled mosharraf,
PDF
Privacy by design
PDF
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
PDF
Worry free security breach - Gemalto
Mobile Devices and Internet of Things
Privacy by Design: White Papaer
Blockchain for Accounting & Assurance
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
The CISO’s Guide to Data Loss Prevention
Privacy frameworks 101
Anton Chuvakin on Security Data Centralization
GDPR project board deck (example)
Convince your board: How to prepare your business for List X
Windstream Managed Network Security Ebook
[null] Iso 27001 a business view by Sripathi
Windstream Managed Network Security Infographic
Keep your data safe and be compliant via a 360° approach
GDPR Part 2: Quest Relevance
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Signs It's Time to Modernize Your Identity Management Software
PCI DSS introduction by khaled mosharraf,
Privacy by design
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Worry free security breach - Gemalto
Ad

Similar to PCI 2010: Trends and Technologies (20)

PPTX
PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
PPTX
Spirit of PCI DSS by Dr. Anton Chuvakin
PPTX
PCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton Chuvakin
PPTX
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
PPT
Pci Europe 2009 Underside Of The Compliance Ecosystem
DOCX
What do I really need to do to STAY compliant with PCI DSS?
PPTX
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
PDF
PCI Myths
PPT
Data Security For Compliance 2
PPTX
PCI DSS Done RIGHT and WRONG by Anton Chuvakin and Branden Williams
DOCX
Myths of PCI DSS
PPTX
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
PPTX
The Easy WAy to Accept & Protect Credit Card Data
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PPTX
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
PPTX
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
PDF
PCI DSS Implementation: A Five Step Guide
PDF
PCI Compliance Report
PPT
Evolution Pci For Pod1
PPT
Tizor_Data-Best-Practices.ppt
PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton Chuvakin
PCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
Pci Europe 2009 Underside Of The Compliance Ecosystem
What do I really need to do to STAY compliant with PCI DSS?
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
PCI Myths
Data Security For Compliance 2
PCI DSS Done RIGHT and WRONG by Anton Chuvakin and Branden Williams
Myths of PCI DSS
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
The Easy WAy to Accept & Protect Credit Card Data
Cyber Risk Management in 2017: Challenges & Recommendations
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
PCI DSS Implementation: A Five Step Guide
PCI Compliance Report
Evolution Pci For Pod1
Tizor_Data-Best-Practices.ppt
Ad

More from Anton Chuvakin (20)

PPTX
SecureWorld 2025 Keynote Déjà Vu All Over Again_ Learning from Cloud's Early...
PPTX
Detection Engineering Maturity - Helping SIEMs Find Their Adulting Skills
PPTX
Future of SOC: More Security, Less Operations
PPTX
SOC Meets Cloud: What Breaks, What Changes, What to Do?
PPTX
Meet the Ghost of SecOps Future by Anton Chuvakin
PPTX
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
PPTX
SOC Lessons from DevOps and SRE by Anton Chuvakin
PPTX
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
PPTX
20 Years of SIEM - SANS Webinar 2022
PPTX
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
PPTX
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
PPTX
SOCstock 2021 The Cloud-native SOC
PPTX
Modern SOC Trends 2020
PPTX
Anton's 2020 SIEM Best and Worst Practices - in Brief
PPTX
Generic siem how_2017
PPTX
Tips on SIEM Ops 2015
PPTX
Five SIEM Futures (2012)
PPTX
RSA 2016 Security Analytics Presentation
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
SecureWorld 2025 Keynote Déjà Vu All Over Again_ Learning from Cloud's Early...
Detection Engineering Maturity - Helping SIEMs Find Their Adulting Skills
Future of SOC: More Security, Less Operations
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Meet the Ghost of SecOps Future by Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SOC Lessons from DevOps and SRE by Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
20 Years of SIEM - SANS Webinar 2022
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2021 The Cloud-native SOC
Modern SOC Trends 2020
Anton's 2020 SIEM Best and Worst Practices - in Brief
Generic siem how_2017
Tips on SIEM Ops 2015
Five SIEM Futures (2012)
RSA 2016 Security Analytics Presentation
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
Teaching material agriculture food technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Cloud computing and distributed systems.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Modernizing your data center with Dell and AMD
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25 Week I
Network Security Unit 5.pdf for BCA BBA.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Diabetes mellitus diagnosis method based random forest with bat algorithm
Teaching material agriculture food technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Monthly Chronicles - July 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Modernizing your data center with Dell and AMD
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectral efficient network and resource selection model in 5G networks

PCI 2010: Trends and Technologies

  • 1. PCI 2010: Trends & Technologies Presented by: Dr. Anton Chuvakin Author of the book “ PCI Compliance” Principal at www.securitywarriorconsulting.com/
  • 2. Agenda Why PCI? Key Question PCI “State of the Union” “ PCI War” Future of PCI?
  • 3. Why is PCI Here? Criminals need money Credit card = money Where are the most cards? In computers. Data theft grows and reaches HUGE volume Some organizations still don’t care … … . especially if the loss is not theirs Payment card brands enforce DSS!
  • 4. PCI DSS is based on fundamental data security practices What is PCI DSS: DSS + Regime Protect stored data Encrypt transmission of cardholder data and sensitive information across public networks Protect Cardholder Data Maintain a policy that addresses information security Maintain an Information Security Policy Track and monitor all access to network resources and cardholder data Regularly test security systems and processes Regularly Monitor and Test Networks Restrict access to data by business need-to-know Assign a unique ID to each person with computer access Restrict physical access to cardholder data Implement Strong Access Control Measures Use and regularly update anti-virus software Develop and maintain secure systems and applications Maintain a Vulnerability Management Program Install and maintain a firewall confirmation to protect data Do not use vendor-supplied defaults for system passwords and other security parameters Build and Maintain a Secure Network
  • 5. Ceiling vs Floor PCI is the “floor” of security However, many prefer to treat it as a “ceiling” Result: security breaches
  • 6. Laggards vs Leaders Issue : many merchants don’t even want to “grow up” to the floor . Action : breaches, fines, “motivation”, guidance, etc Result : security improves!
  • 7. PCI War: Security vs Compliance Issue : some argue that PCI lowers the ceiling of security Truth : PCI doesn’t lower security, YOU do Result : breach is your fault!
  • 8. Myth 7 – PCI Is Enough Security (from “PCI Myths and Misconceptions” by Anton Chuvakin) Myth : PCI is all we need to do for security “ We are secure, we got PCI!” “ We worked hard and we passed an ‘audit’; now we are secure!” Reality: Again, PCI is basic security, it is a necessary, NOT sufficient . PCI is also about cardholder data security , not the rest of private data, not your intellectual property, not SSNs, etc. It also covers confidentiality , and NOT integrity and availability of data.
  • 9. PCI and Security Today <- This is the enemy! This is NOT the enemy! -> Remember: security first , compliance as a result.
  • 10. PCI 2010 Battle for Level3s and Level4s continues : security increases, transaction risk decreases New technologies make payment security easier : tokenization, E2EE, DLP ( who pays? ) Outsource to those who know : don’t fail on your own Cybercrime still rampant : focus on security! Remember : ongoing compliance vs point-in-time validation
  • 11. Quick PCI Action Items Less card data -> less work needed!!! (Yes, 3 times  ) PCI is common sense, basic data security; stop complaining about it - start doing it! After validating that you are compliant, don’t stop: continues compliance AND security is your goal , not “passing an audit”
  • 12. Get More Info! “ PCI Compliance” by Anton Chuvakin and Branden Williams Useful reference for merchants, vendors – and everybody else Out in December 2009!
  • 13. About Anton Chuvakin Dr. Anton Chuvakin Email: [email_address] Site: http://www.chuvakin.org Blog: http://www.securitywarrior.org LinkedIn: http://www.linkedin.com/in/chuvakin Twitter: @anton_chuvakin Consulting : www.securitywarriorconsulting.com For more: http://www.chuvakin.org
  • 14. More on Anton Book author: “Security Warrior”, “PCI Compliance”, “Information Security Management Handbook”, “Know Your Enemy II”, “Hacker’s Challenge 3”, etc Conference speaker: SANS, FIRST, GFIRST, ISSA, CSI, Interop , many, many others worldwide Standard developer: CEE, CVSS, OVAL, etc Community role: SANS, Honeynet Project, WASC, CSI, ISSA, OSSTMM, InfraGard, ISSA, others Past roles: Researcher, Security Analyst, Strategist, Evangelist, Product Manager, now Consultant
  • 15. Anton’s Security Warrior Consulting Services Logging and log management policy Develop logging policies and processes , log review procedures, workflows and periodic tasks as well as help architect those to solve organization problems Plan and implement log management architecture to support your business cases; develop specific components such as log data collection, filtering, aggregation, retention, log source configuration as well as reporting, review and validation Customize industry “best practices” related to logging and log review to fit your environment, help link these practices to business services and regulations Help integrate logging tools and processes into IT and business operations Content development Develop of correlation rules, reports and other content to make your SIEM and log management product more useful to you and more applicable to your risk profile and compliance needs Create and refine policies, procedures and operational practices for logging and log management to satisfy requirements of PCI DSS, HIPAA, NERC, FISMA and other regulations More at www.SecurityWarriorConsulting.com

Editor's Notes

  • #5: Scope! Scope!! Scope!!! PCI DSS is an industry standard that highlights the following: The PCI Data Security Standard is endorsed by the “Participating Brands”: Visa, MasterCard, American Express, Discover Card, JCB and Diners’ Club. Standardized Security Requirements Consistent validation requirements and protocols Common evaluator credentials and approvals Clear procedures for review and reassessment Slide Point of Contact: Eduardo Perez
  • #6: Scope! Scope!! Scope!!!
  • #14: Whether someone’s writing a check at the gas station, using an ATM/debit card to pay for groceries, buying a book online, getting cash out of an ATM, paying for dinner with a credit card or using a gift card to purchase something special, chances are the transaction is moved quickly and securely by First Data. First Data processes transaction data of all kinds, harnesses the power of that data, and delivers innovations in secure infrastructure, intelligence and insight for its customers.  From large financial institutions to the merchant around the corner, First Data supports its customers by helping them process and understand the intelligence behind every transaction. For more, visit www.firstdata.com.