Adoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação

Clavis Segurança da Informação
Clavis Segurança da InformaçãoClavis Segurança da Informação
PCI Payment Protection
Resources for Small Merchants
Carlos Caetano
Associate Regional Director – Brazil at
PCI Security Standards Council
Agenda
Background
Resources
Call to Action
What’s Next
Intro
Intro
What is the PCI Security Standards Council?
Collaboration
Education
Simplified solutions for merchants
What does PCI Council Produce?
Standards, Best Practices & Services
Training – Assessors, Acquirers, Integrators
Validation & Qualification – Equipment, Service Providers, Assessors, Investigators
Payment Equipment Payment Software Merchant & Payment Service
Provider Environments
What’s this all about?
Why?
Small businesses around the world are increasing targets for payment data theft
77% believe that their company is safe from cyber attacks
80% of websites attacked everyday belong to small merchants
Nearly half of global cyberattacks in 2015 were against small businesses
48% of small businesses have been hit by at least one cyber-attack in the
past 12 months
20% see cyber security as a top business priority
10% have never invested in improving the security of their website
54% of SMEs who say they’re concerned their business could be at risk
from an attack
Current Threats
SQL Injection
Weak Passwords
Spear Phishing
Malware / Ransomware
Remote Attack Vector
Poor Patching
“No locale, industry or
organization is bulletproof
when it comes to the
compromise of data”
Verizon 2016 DBIR
Birth and Rebirth of a Data Breach
Target phishing
campaign against
vendor
Person clicks on email and
malware installation occurs
Keylogger deployed and
client’s environment static
auth credentials stolen
for final target access
Malware installed
directly in final
victm’s POS system
Malware functionalities of scraping
RAM and exporting data, establishment
of control and persistence
Source: Verizon 2016 Data Breach Investigations Report
Small Merchant
Task Force
PCI Small Merchant Task Force
Objective
Collaborate with the PCI community to address the needs of the small
merchant market segment by providing guidance that:
• Is simple, easy to understand and relevant to the unique needs of small
merchants
• Helps small merchants understand their responsibility for protecting payment
card data and to identify and mitigate areas of risk in their environment
• Provides small merchants with the information needed when assessing their own
environment, working with a QSA, and/or considering a new payment channel,
vendor or service provider
Global Participation: Merchants & Merchant Partners
“If the larger merchants
and financial institutions
themselves cannot be
protected from data
breaches, you can imagine
how difficult protection is
for independent small
business owners.”
“An issue that many small
businesses have is that they
do not have the in-house
resources to be experts in
all aspects of running a
business. Small businesses
rely on external expertise to
simplify the complicated.”
Meet Mary, Ms. Small Business
• “How do I sell
more wine?”
• “How do I
differentiate
my customers’
experience in
a saturated
market?”
• “How do I find
and keep good
employees?”
• Her bank.
• The 1-800
number on
the sticker
that’s on her
payment
system.
• To understand
why/how she’s
at risk.
• The right
questions to
ask her bank
and her
payment
system vendor
for help.
• Simple steps
she can take.
On her mind Her needsHer dilemma Who she calls
Mary, wine bar owner
• She wants to
do the right
thing for her
customers
and her
business
• BUT, she
doesn’t have
time to
understand
“SSL Rootkits”
Content Development Approach
Audience
Simple, not exhaustive
Accessible
Measurable
Simplifying Security
Simplifying Security
Payment Protection Resources for Small Merchants
Simplifying Security
Guide to Safe Payments
Simplifying Security
Guide to Safe Payments – Understanding Your Risk
Simplifying Security
Guide to Safe Payments – Understanding Your Risk
Simplifying Security
Guide to Safe Payments – Protecting Your Business with Security Basics
Cost
Ease
Risk Mitigation
Simplifying Security
Guide to Safe Payments – Protecting Your Business with Security Basics
Simplifying Security
Guide to Safe Payments – Where to Get Help
Payment Brand List
• List of Compliant Service Providers
PCI DSS and Related Guidance
• More about PCI DSS
• PCI DSS Self-Assessment
Questionnaires
• Guide: Skimming Prevention: Overview
of Best Practices for Merchants
• List of Validated Payment Applications
• List of Approved PTS Devices
• List of Approved Scanning Vendors
• List of Qualified Integrators/Resellers
• List of P2PE Validated Solutions
PCI Council Listings
Simplifying Security
Common Payment Systems
Simplifying Security
Common Payment Systems
Simplifying Security
Common Payment Systems - Example
YES
This IS my setup.
Show me the details.
NO
This IS NOT my setup.
Show me the next step.
BACK
to previous diagram.
Mag Stripe
RISK PROFILE
Chip
TYPE 2 PROTECTIONS
LOWER LOWER
Simplifying Security
Common Payment Systems - Example
Simplifying Security
E-commerce example
YES
This IS my setup.
Show me the details.
NO
This IS NOT my setup.
Show me the next step.
BACK
to previous diagram.
RISK PROFILE
TYPE 10 PROTECTIONS
LOWER
Simplifying Security
E-commerce example
Simplifying Security
Questions to Ask Your Vendors
Simplifying Security
Glossary of Payment Information Security Terms
How Can You Help?
Restaurateurs are not technology experts. They are
skilled in culinary arts, general business management
and hospitality. Like many small businesses, they are
reliant on the expertise of others in the cybersecurity
space. In order for small restaurants to thrive in the
digital age, they will need significant help from the
broader technology and security community.
David Matthews, National Restaurant Association,
PCI Small Merchant Taskforce Co-Chair
“ “
Call to Action
Visit PCI SSC website
Download
Share
Co-brand
https://www.pcisecuritystandards.org/pci_security/small_merchant
How You Can Help
Regional Participant Organizations
Participating Organization Benefits
• Advance review of standards and supporting
materials before release, with the opportunity to
provide feedback
• Complimentary attendance at
annual Community Meetings hosted by the
Council
• Substantial training discounts; courses are
offered in instructor-led and eLearning formats
• Nominate and vote for representatives to stand
for election to the Council’s Board of Advisors
• Drive the Special Interest Groups (SIGs) that
provide the Council with understanding and
guidance on particular topics or technologies
769
PCI Council
Participating
Organizations
Join us: www.pcisecuritystandards.org/get_involved/participating_organizations
Attend South America Forum and Save
We Need
You!
All attendees of the South
America Forum will receive a
$1,500 savings on a PCI
Participation Organization
membership.
Discount Code will be
provided at event.
Check PCI website for more info on the August 2017 event
Get Trained and Ready to Support the Industry
Become a PCI Professional – you’ll be in good company
• Over 2,500 of your colleagues have become
PCIPs - why not join them and show off your PCI
knowledge?
• Get the three-year credential that’s not tied to
your employer.
• When you do, you can show off your professional
status since you’ll be listed on the PCI
website!
https://www.pcisecuritystandards.org/program_training_and_qualification/pci_professional_qualification
What’s Next?
Based on
feedback,
enhance current
small merchant
materials as
needed
Evaluate and
propose simple-
to-use alternate
validation tools
and/or SAQs
Formalize
communications
strategy and
determine
effectiveness of
dissemination
methods
2016 / 2017 Focus
Resources
Check Our
Document Library
for New Resources
www.pcisecuritystandards.org
Thank You
1 von 41

Recomendados

PCI DSS Simplified: What You Need to Know von
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowAlienVault
5.3K views24 Folien
Pci dss-for-it-providers von
Pci dss-for-it-providersPci dss-for-it-providers
Pci dss-for-it-providersCalyptix Security
1.2K views19 Folien
PCI DSS Essential Guide von
PCI DSS Essential GuidePCI DSS Essential Guide
PCI DSS Essential GuideKim Jensen
5.1K views41 Folien
Slideshare fintech-may26th-def von
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-defQafis
220 views23 Folien
Forecast odcau6 100_eb von
Forecast odcau6 100_ebForecast odcau6 100_eb
Forecast odcau6 100_ebOpen Data Center Alliance
560 views13 Folien
AL_PCI-Cheatsheet_web von
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webDerrick McBreairty
228 views5 Folien

Más contenido relacionado

Was ist angesagt?

Security Profile von
Security ProfileSecurity Profile
Security ProfileAhmed Ismail
467 views6 Folien
Security and Privacy in the AWS Cloud - AWS India Summit 2012 von
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
2.2K views25 Folien
Protective Monitoring von
Protective MonitoringProtective Monitoring
Protective Monitoringjohandev
215 views2 Folien
SailPoint - IdentityNow Identity Governance von
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceArijan Horvat
807 views4 Folien
ZyLAB Security and Compliance von
ZyLAB Security and ComplianceZyLAB Security and Compliance
ZyLAB Security and ComplianceZyLAB
18 views35 Folien
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and... von
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan Singh
49 views58 Folien

Was ist angesagt?(20)

Security and Privacy in the AWS Cloud - AWS India Summit 2012 von Amazon Web Services
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Amazon Web Services2.2K views
Protective Monitoring von johandev
Protective MonitoringProtective Monitoring
Protective Monitoring
johandev215 views
SailPoint - IdentityNow Identity Governance von Arijan Horvat
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
Arijan Horvat807 views
ZyLAB Security and Compliance von ZyLAB
ZyLAB Security and ComplianceZyLAB Security and Compliance
ZyLAB Security and Compliance
ZyLAB18 views
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and... von Rohan Singh
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan Singh49 views
2017 Predictions: Identity and Security von SecureAuth
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
SecureAuth1.2K views
The Share Responsibility Model of Cloud Computing - ILTA NYC von Patrick Sklodowski
The Share Responsibility Model of Cloud Computing - ILTA NYCThe Share Responsibility Model of Cloud Computing - ILTA NYC
The Share Responsibility Model of Cloud Computing - ILTA NYC
Patrick Sklodowski109 views
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY von ForgeRock
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
ForgeRock957 views
Multi-Factor Authentication - "Moving Towards the Enterprise" von mycroftinc
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
mycroftinc962 views
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration...... von centralohioissa
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
centralohioissa1.3K views
Safeguarding PCI Data in the Cloud von Hostway|HOSTING
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the Cloud
Hostway|HOSTING563 views
Into the Fluffs: Security Comliance and Audit in the Cloud von Pouria Ghatrenabi
Into the Fluffs: Security Comliance and Audit in the CloudInto the Fluffs: Security Comliance and Audit in the Cloud
Into the Fluffs: Security Comliance and Audit in the Cloud
Pouria Ghatrenabi157 views
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... von Rachel Wandishin
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Rachel Wandishin244 views
bcs_sb_TechPartner_SSLVisibility_Venafi_EN_v1e von Sam Kumarsamy
bcs_sb_TechPartner_SSLVisibility_Venafi_EN_v1ebcs_sb_TechPartner_SSLVisibility_Venafi_EN_v1e
bcs_sb_TechPartner_SSLVisibility_Venafi_EN_v1e
Sam Kumarsamy304 views
Cyber Security in The Cloud von PECB
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
PECB 1.1K views
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta... von aOS Community
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
aOS Community54 views
Workshop on Identity & Access Management. von cisoplatform
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
cisoplatform2.6K views
Sailpoint Online Training on IAM overview von ITJobZone.biz
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
ITJobZone.biz612 views

Similar a Adoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação

What Everybody Ought to Know About PCI DSS and PA-DSS von
What Everybody Ought to Know About PCI DSS and PA-DSSWhat Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSSLondon School of Cyber Security
928 views14 Folien
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio... von
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...i2Coalition
522 views40 Folien
PCI_Presentation_OASIS von
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASISDermot Clarke
445 views22 Folien
Evolution Pci For Pod1 von
Evolution Pci For Pod1Evolution Pci For Pod1
Evolution Pci For Pod1Amanda Squires@Pod1
322 views26 Folien
Symbiotic Consulting Group LLC - PCI Compliance Overview von
Symbiotic Consulting Group LLC - PCI Compliance OverviewSymbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance OverviewRosy Kaur
1.3K views28 Folien
Pci compliance overview earth link business von
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link businessMike Shelah
377 views15 Folien

Similar a Adoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação(20)

Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio... von i2Coalition
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
i2Coalition522 views
Symbiotic Consulting Group LLC - PCI Compliance Overview von Rosy Kaur
Symbiotic Consulting Group LLC - PCI Compliance OverviewSymbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance Overview
Rosy Kaur1.3K views
Pci compliance overview earth link business von Mike Shelah
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link business
Mike Shelah377 views
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D... von Stephanie Gutowski
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Stephanie Gutowski685 views
The Easy WAy to Accept & Protect Credit Card Data von Tyler Hannan
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card Data
Tyler Hannan685 views
PCI Compliance for Community Colleges @One CISOA 2011 von Donald E. Hester
PCI Compliance for Community Colleges @One CISOA 2011PCI Compliance for Community Colleges @One CISOA 2011
PCI Compliance for Community Colleges @One CISOA 2011
Donald E. Hester795 views
Reduce PCI Scope - Maximise Conversion - Whitepaper von Shaun O'keeffe
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
Shaun O'keeffe770 views
ISMG - Fighting Business Email Compromise von Laurent Pacalin
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
Laurent Pacalin582 views
Building an Effective Customer Experience within the ETA Risk Guidelines von Agreement Express Inc.
Building an Effective Customer Experience within the ETA Risk GuidelinesBuilding an Effective Customer Experience within the ETA Risk Guidelines
Building an Effective Customer Experience within the ETA Risk Guidelines
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals von Fit Small Business
PCI Compliance - How To Keep Your Business Safe From Credit Card CriminalsPCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
Fit Small Business1.1K views
How to Prepare for a PCI DSS Audit von SecurityMetrics
How to Prepare for a PCI DSS AuditHow to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS Audit
SecurityMetrics1.1K views
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING von himalya sharma
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGPCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
himalya sharma440 views
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING von himalya sharma
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGPCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
himalya sharma76 views
Risk & Advisory Services: Quarterly Risk Advisor May 2016 von CBIZ, Inc.
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016
CBIZ, Inc.226 views
Introduction To SAQ 4 U von RAlcala65
Introduction To SAQ 4 UIntroduction To SAQ 4 U
Introduction To SAQ 4 U
RAlcala65205 views

Más de Clavis Segurança da Informação

Bsides SP 2022 - EPSS - Final.pptx von
Bsides SP 2022 - EPSS - Final.pptxBsides SP 2022 - EPSS - Final.pptx
Bsides SP 2022 - EPSS - Final.pptxClavis Segurança da Informação
341 views35 Folien
Cloud Summit Canada com Rodrigo Montoro von
Cloud Summit Canada com Rodrigo MontoroCloud Summit Canada com Rodrigo Montoro
Cloud Summit Canada com Rodrigo MontoroClavis Segurança da Informação
386 views39 Folien
Resposta a Incidentes | Mind The Sec 2022 com Rodrigo Montoro von
Resposta a Incidentes | Mind The Sec 2022 com Rodrigo MontoroResposta a Incidentes | Mind The Sec 2022 com Rodrigo Montoro
Resposta a Incidentes | Mind The Sec 2022 com Rodrigo MontoroClavis Segurança da Informação
34 views32 Folien
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação von
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - ApresentaçãoDesenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - ApresentaçãoClavis Segurança da Informação
12K views38 Folien
Big Data e Segurança da Informação - 10o Workshop SegInfo - Apresentação von
Big Data e Segurança da Informação - 10o Workshop SegInfo - ApresentaçãoBig Data e Segurança da Informação - 10o Workshop SegInfo - Apresentação
Big Data e Segurança da Informação - 10o Workshop SegInfo - ApresentaçãoClavis Segurança da Informação
11.3K views16 Folien
A maldição do local admin - 10o Workshop SegInfo - Apresentação von
A maldição do local admin - 10o Workshop SegInfo - ApresentaçãoA maldição do local admin - 10o Workshop SegInfo - Apresentação
A maldição do local admin - 10o Workshop SegInfo - ApresentaçãoClavis Segurança da Informação
11.3K views39 Folien

Más de Clavis Segurança da Informação(20)

Último

STPI OctaNE CoE Brochure.pdf von
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdfmadhurjyapb
12 views1 Folie
Understanding GenAI/LLM and What is Google Offering - Felix Goh von
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohNUS-ISS
39 views33 Folien
Future of Learning - Yap Aye Wee.pdf von
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfNUS-ISS
38 views11 Folien
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica... von
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...NUS-ISS
15 views28 Folien
Roadmap to Become Experts.pptx von
Roadmap to Become Experts.pptxRoadmap to Become Experts.pptx
Roadmap to Become Experts.pptxdscwidyatamanew
11 views45 Folien
Empathic Computing: Delivering the Potential of the Metaverse von
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the MetaverseMark Billinghurst
449 views80 Folien

Último(20)

STPI OctaNE CoE Brochure.pdf von madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb12 views
Understanding GenAI/LLM and What is Google Offering - Felix Goh von NUS-ISS
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS39 views
Future of Learning - Yap Aye Wee.pdf von NUS-ISS
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
NUS-ISS38 views
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica... von NUS-ISS
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
NUS-ISS15 views
Empathic Computing: Delivering the Potential of the Metaverse von Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst449 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab11 views
Perth MeetUp November 2023 von Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price12 views
Voice Logger - Telephony Integration Solution at Aegis von Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma17 views
Special_edition_innovator_2023.pdf von WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2214 views
handbook for web 3 adoption.pdf von Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 von Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi113 views
The Importance of Cybersecurity for Digital Transformation von NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS25 views
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... von Vadym Kazulkin
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
Vadym Kazulkin70 views
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze von NUS-ISS
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
NUS-ISS19 views

Adoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação

  • 1. PCI Payment Protection Resources for Small Merchants Carlos Caetano Associate Regional Director – Brazil at PCI Security Standards Council
  • 4. What is the PCI Security Standards Council? Collaboration Education Simplified solutions for merchants
  • 5. What does PCI Council Produce? Standards, Best Practices & Services Training – Assessors, Acquirers, Integrators Validation & Qualification – Equipment, Service Providers, Assessors, Investigators Payment Equipment Payment Software Merchant & Payment Service Provider Environments
  • 7. Why? Small businesses around the world are increasing targets for payment data theft 77% believe that their company is safe from cyber attacks 80% of websites attacked everyday belong to small merchants Nearly half of global cyberattacks in 2015 were against small businesses 48% of small businesses have been hit by at least one cyber-attack in the past 12 months 20% see cyber security as a top business priority 10% have never invested in improving the security of their website 54% of SMEs who say they’re concerned their business could be at risk from an attack
  • 8. Current Threats SQL Injection Weak Passwords Spear Phishing Malware / Ransomware Remote Attack Vector Poor Patching “No locale, industry or organization is bulletproof when it comes to the compromise of data” Verizon 2016 DBIR
  • 9. Birth and Rebirth of a Data Breach Target phishing campaign against vendor Person clicks on email and malware installation occurs Keylogger deployed and client’s environment static auth credentials stolen for final target access Malware installed directly in final victm’s POS system Malware functionalities of scraping RAM and exporting data, establishment of control and persistence Source: Verizon 2016 Data Breach Investigations Report
  • 11. PCI Small Merchant Task Force Objective Collaborate with the PCI community to address the needs of the small merchant market segment by providing guidance that: • Is simple, easy to understand and relevant to the unique needs of small merchants • Helps small merchants understand their responsibility for protecting payment card data and to identify and mitigate areas of risk in their environment • Provides small merchants with the information needed when assessing their own environment, working with a QSA, and/or considering a new payment channel, vendor or service provider
  • 12. Global Participation: Merchants & Merchant Partners “If the larger merchants and financial institutions themselves cannot be protected from data breaches, you can imagine how difficult protection is for independent small business owners.” “An issue that many small businesses have is that they do not have the in-house resources to be experts in all aspects of running a business. Small businesses rely on external expertise to simplify the complicated.”
  • 13. Meet Mary, Ms. Small Business • “How do I sell more wine?” • “How do I differentiate my customers’ experience in a saturated market?” • “How do I find and keep good employees?” • Her bank. • The 1-800 number on the sticker that’s on her payment system. • To understand why/how she’s at risk. • The right questions to ask her bank and her payment system vendor for help. • Simple steps she can take. On her mind Her needsHer dilemma Who she calls Mary, wine bar owner • She wants to do the right thing for her customers and her business • BUT, she doesn’t have time to understand “SSL Rootkits”
  • 14. Content Development Approach Audience Simple, not exhaustive Accessible Measurable
  • 16. Simplifying Security Payment Protection Resources for Small Merchants
  • 18. Simplifying Security Guide to Safe Payments – Understanding Your Risk
  • 19. Simplifying Security Guide to Safe Payments – Understanding Your Risk
  • 20. Simplifying Security Guide to Safe Payments – Protecting Your Business with Security Basics Cost Ease Risk Mitigation
  • 21. Simplifying Security Guide to Safe Payments – Protecting Your Business with Security Basics
  • 22. Simplifying Security Guide to Safe Payments – Where to Get Help Payment Brand List • List of Compliant Service Providers PCI DSS and Related Guidance • More about PCI DSS • PCI DSS Self-Assessment Questionnaires • Guide: Skimming Prevention: Overview of Best Practices for Merchants • List of Validated Payment Applications • List of Approved PTS Devices • List of Approved Scanning Vendors • List of Qualified Integrators/Resellers • List of P2PE Validated Solutions PCI Council Listings
  • 25. Simplifying Security Common Payment Systems - Example YES This IS my setup. Show me the details. NO This IS NOT my setup. Show me the next step. BACK to previous diagram. Mag Stripe RISK PROFILE Chip TYPE 2 PROTECTIONS LOWER LOWER
  • 27. Simplifying Security E-commerce example YES This IS my setup. Show me the details. NO This IS NOT my setup. Show me the next step. BACK to previous diagram. RISK PROFILE TYPE 10 PROTECTIONS LOWER
  • 30. Simplifying Security Glossary of Payment Information Security Terms
  • 31. How Can You Help?
  • 32. Restaurateurs are not technology experts. They are skilled in culinary arts, general business management and hospitality. Like many small businesses, they are reliant on the expertise of others in the cybersecurity space. In order for small restaurants to thrive in the digital age, they will need significant help from the broader technology and security community. David Matthews, National Restaurant Association, PCI Small Merchant Taskforce Co-Chair “ “
  • 33. Call to Action Visit PCI SSC website Download Share Co-brand https://www.pcisecuritystandards.org/pci_security/small_merchant How You Can Help
  • 35. Participating Organization Benefits • Advance review of standards and supporting materials before release, with the opportunity to provide feedback • Complimentary attendance at annual Community Meetings hosted by the Council • Substantial training discounts; courses are offered in instructor-led and eLearning formats • Nominate and vote for representatives to stand for election to the Council’s Board of Advisors • Drive the Special Interest Groups (SIGs) that provide the Council with understanding and guidance on particular topics or technologies 769 PCI Council Participating Organizations Join us: www.pcisecuritystandards.org/get_involved/participating_organizations
  • 36. Attend South America Forum and Save We Need You! All attendees of the South America Forum will receive a $1,500 savings on a PCI Participation Organization membership. Discount Code will be provided at event. Check PCI website for more info on the August 2017 event
  • 37. Get Trained and Ready to Support the Industry Become a PCI Professional – you’ll be in good company • Over 2,500 of your colleagues have become PCIPs - why not join them and show off your PCI knowledge? • Get the three-year credential that’s not tied to your employer. • When you do, you can show off your professional status since you’ll be listed on the PCI website! https://www.pcisecuritystandards.org/program_training_and_qualification/pci_professional_qualification
  • 39. Based on feedback, enhance current small merchant materials as needed Evaluate and propose simple- to-use alternate validation tools and/or SAQs Formalize communications strategy and determine effectiveness of dissemination methods 2016 / 2017 Focus
  • 40. Resources Check Our Document Library for New Resources www.pcisecuritystandards.org