SlideShare uma empresa Scribd logo
1 de 20
PCI: The Real Deal
How to do PCI Right
(And how to really hose it up)
Branden R. Williams, CISSP, CISM
bwilliams@verisign.com
www.brandenwilliams.com
Why companies succeed
What are the steps to success?
PCI Requires Planning
Programmatic approach
Fully staffed compliance office
Trained and/or certified
Must be baked into culture
Getting it RIGHT
Medium sized service
provider
Assessment scope
less than 1% of
systems
On-Site Assessment
done in 1 week
No gaps last three
years
How do they do it?
Simple & elegant
payment systems
Complex ≠ Competitive
Advantage
Simplicity+Elegance =
Competitive Advantage
Go into assessment
knowing you will pass
Good Program Makeup
Documented Data Flows
Accountability
Documentation
Plan for Maintenance
Process Integration
Training
Assessment Prep/Self Assessment
Why companies fail
Avoid these pitfalls!
Getting it wrong
Medium US-Based
Retail
< 1000 locations
Fail every year
But remediate in 60 days
Out of compliance for
most of year
Risk breach in
between
Getting it wronger
No repeatable processes
Compliance viewed as “audit”
Security/Compliance office buried
All reporting to IT?
CISO unable to sell MGT
Process stagnates
How could we improve?
Build a program to MAINTAIN PCI
Security reporting elsewhere
CFO
HR
Legal
CISO take a business need
Audit results
What are secure
companies doing?
Encrypt all stored data
What are my options?
Retrofit applications
Use an encryption appliance
Use an encrypting database
Render unreadable withoutencryption (truncation, hashing)
The Dangers of Encryption
Enterprise-Wide Approach
Create a sound strategy
Data flows required!
Hashing/Rainbow Tables
What is the risk of Hashing?
Hashed Data = Cardholder Data. Wait… What?
Hashes must be treated like encrypted card data
Hashing is still a viable method!
Watch other data stored nearby
What is a Rainbow Table?
Subvert complex math
Orange vs. Juice
Pre-computed hashes
Secrecy in Salt/Algorithm
Truncation
What is Truncation?
Remove all but First 6, Last 4
Identify any transaction
First 6, Last 4
Date/Time of Purchase
Amount
Auth Code
Who does what?
What is on the horizon?
What does the future hold?
Fees, Fines, and
Penalties, OH MY!
Cost of assessments rising (Q/A)
Global Fines in 18 months
Payment App Mandates
Scrutiny of Assessments
High Tech Payments
SIM Based Payments
PED Encryption
Chip/PIN (BUSTED)
RFID/Contactless
Examples!
Discuss Breaches
Questions & Answers
Branden R. Williams, CISSP, CISM
bwilliams@verisign.com
www.brandenwilliams.com

Mais conteúdo relacionado

Semelhante a NWA ISSA Meeting

Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
Rishabh Software
 
Accounting power point
Accounting power pointAccounting power point
Accounting power point
mford08
 
The Dream Team - Getting Involvement Above and Beyond Sales
The Dream Team - Getting Involvement Above and Beyond SalesThe Dream Team - Getting Involvement Above and Beyond Sales
The Dream Team - Getting Involvement Above and Beyond Sales
dreamforce2006
 

Semelhante a NWA ISSA Meeting (20)

Secrets of crm success 2016 presentation
Secrets of crm success 2016 presentationSecrets of crm success 2016 presentation
Secrets of crm success 2016 presentation
 
myeNovation_Deck_Kaizen Dec 2023.pdf
myeNovation_Deck_Kaizen Dec 2023.pdfmyeNovation_Deck_Kaizen Dec 2023.pdf
myeNovation_Deck_Kaizen Dec 2023.pdf
 
What we need in 2009
What we need in 2009What we need in 2009
What we need in 2009
 
Bogdana Butnar: What I need…
Bogdana Butnar: What I need…Bogdana Butnar: What I need…
Bogdana Butnar: What I need…
 
HDI 2016 five innovations in analytics
HDI 2016 five innovations in analyticsHDI 2016 five innovations in analytics
HDI 2016 five innovations in analytics
 
Small Law Key Performance Indicators
Small Law Key Performance IndicatorsSmall Law Key Performance Indicators
Small Law Key Performance Indicators
 
Need Middleware Monitoring? Build a Better Business Case.
Need Middleware Monitoring?  Build a Better Business Case.Need Middleware Monitoring?  Build a Better Business Case.
Need Middleware Monitoring? Build a Better Business Case.
 
How To Save Millions At Your Company
How To Save Millions At Your CompanyHow To Save Millions At Your Company
How To Save Millions At Your Company
 
3 Questions Every Board Needs to Ask About Enterprise Risks
3 Questions Every Board Needs to Ask About Enterprise Risks 3 Questions Every Board Needs to Ask About Enterprise Risks
3 Questions Every Board Needs to Ask About Enterprise Risks
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
 
How to take the pain out of auditing in fast growing businesses
How to take the pain out of auditing in fast growing businessesHow to take the pain out of auditing in fast growing businesses
How to take the pain out of auditing in fast growing businesses
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Accounting power point
Accounting power pointAccounting power point
Accounting power point
 
gtFace: Business intelligence (BI - presentation)
gtFace: Business intelligence (BI - presentation)gtFace: Business intelligence (BI - presentation)
gtFace: Business intelligence (BI - presentation)
 
gtFace: Business Intelligence BI
gtFace: Business Intelligence BIgtFace: Business Intelligence BI
gtFace: Business Intelligence BI
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Digital Marketing Audit Template (2016)
Digital Marketing Audit Template (2016)Digital Marketing Audit Template (2016)
Digital Marketing Audit Template (2016)
 
The Dream Team - Getting Involvement Above and Beyond Sales
The Dream Team - Getting Involvement Above and Beyond SalesThe Dream Team - Getting Involvement Above and Beyond Sales
The Dream Team - Getting Involvement Above and Beyond Sales
 
Invest in Specialty Skills and Other Tips for Internal Audit Planning
Invest in Specialty Skills and Other Tips for Internal Audit PlanningInvest in Specialty Skills and Other Tips for Internal Audit Planning
Invest in Specialty Skills and Other Tips for Internal Audit Planning
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

NWA ISSA Meeting

  • 1. PCI: The Real Deal How to do PCI Right (And how to really hose it up) Branden R. Williams, CISSP, CISM bwilliams@verisign.com www.brandenwilliams.com
  • 2. Why companies succeed What are the steps to success?
  • 3. PCI Requires Planning Programmatic approach Fully staffed compliance office Trained and/or certified Must be baked into culture
  • 4. Getting it RIGHT Medium sized service provider Assessment scope less than 1% of systems On-Site Assessment done in 1 week No gaps last three years
  • 5. How do they do it? Simple & elegant payment systems Complex ≠ Competitive Advantage Simplicity+Elegance = Competitive Advantage Go into assessment knowing you will pass
  • 6. Good Program Makeup Documented Data Flows Accountability Documentation Plan for Maintenance Process Integration Training Assessment Prep/Self Assessment
  • 7. Why companies fail Avoid these pitfalls!
  • 8. Getting it wrong Medium US-Based Retail < 1000 locations Fail every year But remediate in 60 days Out of compliance for most of year Risk breach in between
  • 9. Getting it wronger No repeatable processes Compliance viewed as “audit” Security/Compliance office buried All reporting to IT? CISO unable to sell MGT Process stagnates
  • 10. How could we improve? Build a program to MAINTAIN PCI Security reporting elsewhere CFO HR Legal CISO take a business need Audit results
  • 12. Encrypt all stored data What are my options? Retrofit applications Use an encryption appliance Use an encrypting database Render unreadable withoutencryption (truncation, hashing) The Dangers of Encryption Enterprise-Wide Approach Create a sound strategy Data flows required!
  • 13. Hashing/Rainbow Tables What is the risk of Hashing? Hashed Data = Cardholder Data. Wait… What? Hashes must be treated like encrypted card data Hashing is still a viable method! Watch other data stored nearby What is a Rainbow Table? Subvert complex math Orange vs. Juice Pre-computed hashes Secrecy in Salt/Algorithm
  • 14. Truncation What is Truncation? Remove all but First 6, Last 4 Identify any transaction First 6, Last 4 Date/Time of Purchase Amount Auth Code
  • 16. What is on the horizon? What does the future hold?
  • 17. Fees, Fines, and Penalties, OH MY! Cost of assessments rising (Q/A) Global Fines in 18 months Payment App Mandates Scrutiny of Assessments
  • 18. High Tech Payments SIM Based Payments PED Encryption Chip/PIN (BUSTED) RFID/Contactless Examples!
  • 20. Questions & Answers Branden R. Williams, CISSP, CISM bwilliams@verisign.com www.brandenwilliams.com