SlideShare ist ein Scribd-Unternehmen logo
1 von 54
www.indefensesecurity.com 11
Presented by
PCI Obligations for Merchants:
Myths, Reality and Solutions
www.indefensesecurity.com 2
TOM
PIRES
Chief Info Security Officer
PCI-QIR Certified
GIAC Certified Pen Tester
InDefense Security
tom@indefensesecurity.com
843-633-3732
Your Presenters
JEANA
THOMAS
NCR Certified Counterpoint Trainer
PCI-QIR Certified
C&K Systems
training@cksystem.com
888-476-7911 ext. 3
www.indefensesecurity.com 3
MYTHS &
MISCONCEPTIONS
REALITY
CHECKS
AVAILABLE
SOLUTIONS
Today’s webinar will focus on three core areas of focus that can help provide
definitive clarity for merchants in regards to their PCI Compliance Obligations.
Three Areas of Focus
www.indefensesecurity.com 4
COMMON MYTHS & MISCONCEPTIONS
merchants have about their PCI Compliance Obligations.
Part 1.
www.indefensesecurity.com 5
Common Myths & Misconceptions
“I’m a small company, hackers only target
large companies to hack.”
Misconception.
www.indefensesecurity.com 6
Common Myths & Misconceptions
“PCI is a recommendation, not a
requirement.”
Misconception.
www.indefensesecurity.com 7
Common Myths & Misconceptions
“PCI Compliance is only for larger
companies with an IT team.”
Misconception.
www.indefensesecurity.com 8
Common Myths & Misconceptions
“I do quarterly vulnerability scans,
therefore I am PCI Compliant.”
Misconception.
www.indefensesecurity.com 9
Common Myths & Misconceptions
“Outsourcing card processing takes my
business out of scope for PCI Compliance.”
Myth.
www.indefensesecurity.com 10
Common Myths & Misconceptions
“I didn’t sign anything saying I would be
PCI Compliant.”
Myth.
www.indefensesecurity.com 11
Common Myths & Misconceptions
“I can wait until my bank requires me
to be PCI Compliant.”
Misconception
www.indefensesecurity.com 12
Common Myths & Misconceptions
“I use PayPal / Authorize.Net, therefore PCI
Compliance does not apply to me.”
Misconception
www.indefensesecurity.com 13
Common Myths & Misconceptions
“PCI Compliance only applies to
e-commerce businesses and websites.”
Misconception
www.indefensesecurity.com 14
Common Myths & Misconceptions
“My point of sale software is compliant,
therefore I am PCI Compliant.”
Misconception
www.indefensesecurity.com 15
Common Myths & Misconceptions
“I don’t process credit cards through my
POS system, so I don’t have to follow
PCI Compliance requirements.”
Misconception
www.indefensesecurity.com 16
Common Myths & Misconceptions
“Its ok to have shared usernames and
passwords for my employees.”
Misconception
www.indefensesecurity.com 17
Common Myths & Misconceptions
“I use EMV technology, so I am
PCI Compliant.”
Misconception
www.indefensesecurity.com 18
Common Myths & Misconceptions
“I’ve been in business for over a decade
and have never had a fraudulent charge.”
Misconception
www.indefensesecurity.com 19
Common Myths & Misconceptions
“I process less than 10,000 transactions a
year, so I am out of scope.”
Myth
www.indefensesecurity.com 20
Common Myths & Misconceptions
“I have cyber breach insurance, so I don’t
have to worry about being hacked.”
Misconception
www.indefensesecurity.com 21
Common Myths & Misconceptions
“My bank makes sure my cardholder data
is kept safe.”
Misconception
www.indefensesecurity.com 22
Common Myths & Misconceptions
“I have a firewall and anti-virus, so I am
already protected.”
Misconception
www.indefensesecurity.com 23
Common Myths & Misconceptions
“My employees don’t have to know about
PCI Compliance.”
Myth
www.indefensesecurity.com 24
REALITY CHECK:
Why merchants SHOULD be concerned
about their PCI Compliance Obligations.
Part 2.
www.indefensesecurity.com 25
Reality: Source of Cyber Security Incidents
6%
73%
18%
2%
Attack Source
Malicious Outsider
Accidental Loss
Malicious Insider
State Sponsored
Hacktivist
1%
Source: Gemalto’s Breach Level Index Report - 2013-Present
www.indefensesecurity.com 26
Hackers only have to be
right once, you have to be
right 100% of the time.
REALITY CHECK
www.indefensesecurity.com 27
REALITY CHECK
“There are those who
have been hacked and
those who don’t know
they have been hacked.”
-James Comey, FBI Director
www.indefensesecurity.com 28
The following is an example of
a common path of an attack.
Phishing
Email Link
Email
Attachment
Alter
behavior
Person User
Desktop
Malware
Installation
Steal
Credentials
Use of Stolen
Credentials
Direct Install
of Malware
Backdoor, C2,
Ram Scraper,
Export data
PaymentPOS terminal
Controller
Common Attack Vector
www.indefensesecurity.com 29
MERCHANT AGREEMENTS
The Fine Print that all merchants need to read.
www.indefensesecurity.com 30
Reality Check
“Banks are not doing a good job educating
merchants about PCI Compliance.”
REALITY
www.indefensesecurity.com 31
Reality Check
“Banks do a great job at only assessing
and collecting fines.”
REALITY
www.indefensesecurity.com 32
LIABILITY SHIFT FROM BANKS TO MERCHANTS
Merchants are now at risk of fines for credit card fraud.
October 2015
www.indefensesecurity.com 33
What Exactly Is PCI Compliance?
A set of requirements the merchant must follow to protect cardholder data
An organization created by the major credit card companies in an effort to
better protect cardholder data.
WHO IS THE PCI COUNCIL?
Payment Card Industry Security Standards Council (PCI-SSC).
WHO MAKES THESE REQUIREMENTS?
The PCI-SSC was formed in response to an increase in data security breaches,
which not only put customers at risk, but also increase the credit card companies’
costs.
WHY DID THEY MAKE THESE REQUIREMENTS?
Anyone who excepts credit cards for payments.
WHO HAS TO BE PCI COMPLIANT?
Download PCI-DSS v3.2 Quick Reference Guide.
www.indefensesecurity.com/pci
www.indefensesecurity.com 34
PCI Compliance: A 50,000 Ft View
Monitor and Test
Networks
Information
Security Policy
Strong Access
Control
Protect
Cardholder Data
Vulnerability
Management
Build and Maintain a
Secure Network
www.indefensesecurity.com 35
Goals PCI-DSS Requirements
Build and Maintain a Secure
Network and Systems
1. Install and maintain a firewall configuration
2. Do not use vendor supplied passwords
Protect Cardholder Data
3. Protect stored cardholder data
4. Encrypt transmission of cardholder data across open, public networks
Maintain a Vulnerability
Management Program
5. Protect all systems against malware and regularly update anti-virus software programs
6. Develop and maintain secure systems and applications
Implement Strong Access
Control Measures
7. Restrict access to cardholder data by business ‘need to know’
8. Identify and authenticate access to system components
9. Restrict physical access to cardholder data
Regularly Monitor and Test
Networks
10. Track and monitor all access to network resources and cardholder data
11. Regularly test security systems and processes
Maintain an Information
Security Policy
12. Maintain a policy that addresses information security of all personnel
PCI Compliance: On The Ground
www.indefensesecurity.com 36
QUARTERLY INTERNAL VULNERABILITY SCANS
are required according to PCI-DSS guidelines.
Did You Know. . .
www.indefensesecurity.com 37
Trustwave only provides external scans.
Did You Know. . .
www.indefensesecurity.com 38
ANNUAL PENETRATION TESTS
are required according to PCI-DSS guidelines.
Did You Know. . .
www.indefensesecurity.com 39
A penetration test is an
attack on the network to
exploit weaknesses.
PENETRATION TESTS
Very clear, distinct differences. . .
Vulnerability Scans vs. Penetration Tests
A vulnerability scan looks
for weaknesses in the
network.
VULNERABILITY SCANS
www.indefensesecurity.com 40
WRITTEN SECURITY POLICIES AND PROCEDURES
for your organization?
Do You Have. . .
PROVIDE SECURITY TRAINING FOR EMPLOYEES
on security best practices, procedures and awareness?
Do You . . .
PROVIDE AWARENESS TRAINING FOR EMPLOYEES
on how to recognize phishing attempts and social engineering?
Do You . . .
www.indefensesecurity.com 41
SECURITY SOLUTIONS & AWARENESS PROGRAMS:
A Pathway for Merchants to Achieve PCI Compliance.
Part 3.
www.indefensesecurity.com 42
Month(s) Level 1 Level 2
1 to 3 $10,000/mo. $5,000/mo.
4 to 6 $50,000/mo. $25,000/mo.
7 and on $100,000/mo. $50,000/mo.
Wake-Up Call: Non-Compliance Fines
Banks:
from $5,000 to $500,000, based
on forensic research to remediate
non-compliance.
Example:
Time-Cost Schedule - VISA:
Credit Card Institutions:
May levy fines and propose a
timeline of “increasing fines”
www.indefensesecurity.com
We’re here to help slide
43
We’re Here to Help!
Accurate
Assessment
Effective
Planning
Proper
Execution
www.indefensesecurity.com 44
Our Services
Our comprehensive,
centrally managed
security solutions help
organizations simplify
their security operations
with a complete suite of
security safeguards,
products and services.
DATA LOSS
PREVENTION
PCI COMPLIANCE
CONSULTING
PCI-QIR
POS VALIDATION
MANAGED
SECURITY
PENETRATION
TESTING
VULNERABILITY
ASSESSMENTS
POLICY &
PROCEDURE
MANAGEMENT
SECURITY
AWARENESS
TRAINING
CYBER RISK
ASSESSMENTS
PCI-DSS Req. 11.2 PCI-DSS Req. 11.3 PCI-DSS Req. 12.6
VISA Merchant Req. PCI-DSS Req. 12
www.indefensesecurity.com 45
Identify critical assets that need protected.
Protect those assets to limit impact.
Be able to accurately detect security problems.
Preparedness to recover from an incident.
Be ready to respond if you have an incident.
PROTECT
DETECT
RESPOND
IDENTIFY
RECOVERY
NIST Cyber Security Framework Is Our Philosophy
www.indefensesecurity.com 46
Annual Security Model
Action PlanEducation &
Awareness
Discovery
A well established security
model works with each stage
of the NIST Cyber Security
Framework.
www.indefensesecurity.com 47
Action Plan For Endpoint Security
• Managed Anti-Virus
• Patch Management
• Policy Management
ENDPOINT MANAGEMENT & SECURITY
• Vulnerability & Risk Monitoring
• Backup / Disaster Recovery (DLP)
• Mobile Device Management
www.indefensesecurity.com 48
Action Plan For Network Security
• Firewall Management
• Network Traffic Monitoring
• Network Protocol Security Review
• Server Security Review
• DNS Filtering / Monitoring
• Security Log Monitoring
• Mobile Infrastructure Management
• Data Loss Prevention (DLP)
• Data In Transit Monitoring
• Data At Rest Monitoring
• Backup / Disaster Recovery
NETWORK MANAGEMENT & SECURITY
www.indefensesecurity.com 49
SECURITY AWARENESS TRAINING
Action Plan For Security Training
• Mobile Device Security
• Password Management
• Executive Security Awareness
• Breach Planning
• Email Phishing Security Tests
• Ransomware / Malware
• Credit Card Security Awareness
• Social Engineering Dangers
• Safe Web Browsing
www.indefensesecurity.com
We provide assistance in developing the
necessary security policies and education
programs needed to meet HR, insurance,
legal and regulatory requirements.
50
Action Plan For Security Policy Development
www.indefensesecurity.com 51
Action Plan For Regulatory Compliance
• Penetration Testing & Risk Assessment
• On-going Security Awareness Training
ACHIEVE & MAINTAIN REGULATORY COMPLIANCE
• Compliance Consulting
• Security Policy & Procedure Review
www.indefensesecurity.com 52
CYBER RISK ASSESSMENTS
an executive summary of your overall security posture.
DISCOVERY
TASKS
RISK
SCORE
ISSUE
SUMMARY
INTERNET
SPEED TEST
ASSET
SUMMARY
SERVER
AGING
WORKSTATION
AGING
www.indefensesecurity.com 53
Cyber Risk Assessments
2-3hr
Assessment
Report Card
Results
In-Depth
Score Review
www.indefensesecurity.com 54
(843)633-3732
www.indefensesecurity.com
Questions?
www.cksystem.com
(888)476-7911

Weitere ähnliche Inhalte

Was ist angesagt?

Making Compliance Business as Usual
Making Compliance Business as UsualMaking Compliance Business as Usual
Making Compliance Business as UsualControlCase
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECKimberly Simon MBA
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...ControlCase
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)Kimberly Simon MBA
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as UsualControlCase
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringKimberly Simon MBA
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSSKimberly Simon MBA
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the CloudControlCase
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewisc2-hellenic
 
ControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001ControlCase
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)Kimberly Simon MBA
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance ChecklistControlCase
 
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PALog Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PAControlCase
 
PCI DSS and PA DSS Version 3.0 Changes
PCI DSS and PA DSS Version 3.0 Changes PCI DSS and PA DSS Version 3.0 Changes
PCI DSS and PA DSS Version 3.0 Changes ControlCase
 

Was ist angesagt? (20)

Making Compliance Business as Usual
Making Compliance Business as UsualMaking Compliance Business as Usual
Making Compliance Business as Usual
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSS
 
Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSS
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 
PCI DSS 3.2
PCI DSS 3.2PCI DSS 3.2
PCI DSS 3.2
 
ControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSS
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
 
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PALog Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
 
PCI DSS and PA DSS Version 3.0 Changes
PCI DSS and PA DSS Version 3.0 Changes PCI DSS and PA DSS Version 3.0 Changes
PCI DSS and PA DSS Version 3.0 Changes
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 

Ähnlich wie PCI Compliance Myths, Reality and Solutions for Retail

PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card CriminalsPCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card CriminalsFit Small Business
 
PCI Compliance for Dummies
PCI Compliance for DummiesPCI Compliance for Dummies
PCI Compliance for DummiesLiberteks
 
Payment card industry data security standard 1
Payment card industry data security standard 1Payment card industry data security standard 1
Payment card industry data security standard 1wardell henley
 
Pci compliance overview earth link business
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link businessMike Shelah
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...Ingenico Group
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureDave James
 
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdfpci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdfssuserbcc088
 
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...i2Coalition
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachUlf Mattsson
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standardsallychiu
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notCheapSSLsecurity
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantMelanie Beam
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Merchants
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASISDermot Clarke
 
PCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and RealityPCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and RealityAnton Chuvakin
 
PCI Compliance Seminar
PCI Compliance SeminarPCI Compliance Seminar
PCI Compliance Seminardlinehan2
 

Ähnlich wie PCI Compliance Myths, Reality and Solutions for Retail (20)

PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card CriminalsPCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
 
PCI Compliance for Dummies
PCI Compliance for DummiesPCI Compliance for Dummies
PCI Compliance for Dummies
 
Payment card industry data security standard 1
Payment card industry data security standard 1Payment card industry data security standard 1
Payment card industry data security standard 1
 
Pci compliance overview earth link business
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link business
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdfpci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
 
PCI Myths
PCI MythsPCI Myths
PCI Myths
 
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if not
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASIS
 
PCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and RealityPCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and Reality
 
PCI Compliance Seminar
PCI Compliance SeminarPCI Compliance Seminar
PCI Compliance Seminar
 

Kürzlich hochgeladen

Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlIndian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlAroojKhan71
 
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls DubaiDubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls Dubaikojalkojal131
 
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai WhsatappFilm= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatappkojalkojal131
 
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Delhi Call girls
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyKatherineBishop4
 
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Delhi Call girls
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyTinuiti
 
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Delhi Call girls
 
Supermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdfSupermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdfKarliNelson4
 
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...Call Girls in Nagpur High Profile
 

Kürzlich hochgeladen (10)

Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlIndian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
 
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls DubaiDubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
 
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai WhsatappFilm= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
 
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing Study
 
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing Study
 
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
 
Supermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdfSupermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdf
 
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
 

PCI Compliance Myths, Reality and Solutions for Retail