nwa issa meeting

20
PCI: The Real Deal How to do PCI Right (And how to really hose it up) Branden R. Williams, CISSP, CISM [email protected] www.brandenwilliams.co m

Upload: branden-williams

Post on 05-Aug-2015

760 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: NWA ISSA Meeting

PCI: The Real DealHow to do PCI Right

(And how to really hose it up)

Branden R. Williams, CISSP, [email protected]

www.brandenwilliams.com

Page 2: NWA ISSA Meeting

Why companies succeed

What are the steps to success?

Page 3: NWA ISSA Meeting

PCI Requires Planning

Programmatic approach

Fully staffed compliance office

Trained and/or certified

Must be baked into culture

Page 4: NWA ISSA Meeting

Getting it RIGHT

Medium sized service provider

Assessment scope less than 1% of systems

On-Site Assessment done in 1 week

No gaps last three years

Page 5: NWA ISSA Meeting

How do they do it?

Simple & elegant payment systems

Complex ≠ Competitive Advantage

Simplicity+Elegance = Competitive Advantage

Go into assessment knowing you will pass

Page 6: NWA ISSA Meeting

Good Program Makeup

Documented Data FlowsAccountabilityDocumentationPlan for MaintenanceProcess IntegrationTrainingAssessment Prep/Self Assessment

Page 7: NWA ISSA Meeting

Why companies failAvoid these pitfalls!

Page 8: NWA ISSA Meeting

Getting it wrongMedium US-Based Retail

< 1000 locations

Fail every year

But remediate in 60 days

Out of compliance for most of year

Risk breach in between

Page 9: NWA ISSA Meeting

Getting it wronger

No repeatable processes

Compliance viewed as “audit”

Security/Compliance office buried

All reporting to IT?

CISO unable to sell MGT

Process stagnates

Page 10: NWA ISSA Meeting

How could we improve?

Build a program to MAINTAIN PCI

Security reporting elsewhereCFOHRLegal

CISO take a business need

Audit results

Page 11: NWA ISSA Meeting

What are secure companies doing?

Page 12: NWA ISSA Meeting

Encrypt all stored data

What are my options?Retrofit applicationsUse an encryption applianceUse an encrypting database Render unreadable withoutencryption (truncation, hashing)

The Dangers of EncryptionEnterprise-Wide ApproachCreate a sound strategyData flows required!

Page 13: NWA ISSA Meeting

Hashing/Rainbow Tables

What is the risk of Hashing?Hashed Data = Cardholder Data. Wait… What?Hashes must be treated like encrypted card dataHashing is still a viable method!Watch other data stored nearby

What is a Rainbow Table?Subvert complex mathOrange vs. JuicePre-computed hashesSecrecy in Salt/Algorithm

Page 14: NWA ISSA Meeting

TruncationWhat is Truncation?

Remove all but First 6, Last 4

Identify any transactionFirst 6, Last 4Date/Time of PurchaseAmountAuth Code

Page 15: NWA ISSA Meeting

Who does what?

Page 16: NWA ISSA Meeting

What is on the horizon?

What does the future hold?

Page 17: NWA ISSA Meeting

Fees, Fines, and Penalties, OH MY!

Cost of assessments rising (Q/A)

Global Fines in 18 months

Payment App Mandates

Scrutiny of Assessments

Page 18: NWA ISSA Meeting

High Tech Payments

SIM Based Payments

PED Encryption

Chip/PIN (BUSTED)

RFID/Contactless

Examples!

Page 19: NWA ISSA Meeting

Discuss Breaches

Page 20: NWA ISSA Meeting

Questions & Answers

Branden R. Williams, CISSP, [email protected]

www.brandenwilliams.com