SlideShare a Scribd company logo
1 of 27
Do My Security Controls
Achieve Wireless PCI DSS?
Compliance in the new world of threats
You will learn about:
 The cost of non-compliance
 Trends impacting wireless PCI compliance
 PCI DSS 3.1 standard and wireless security
 PCI best practices
Expert Speaker
Kevin McCauley
Director of Retail Market
Development
AirTight Networks
View the webinar
Do My Security Controls Achieve
Wireless PCI DSS?
Compliance in the new world of threats
The Cost of Non-Compliance
If your business accepts payment cards, it needs to be PCI
compliant to protect customer data. Wi-Fi is a common
attack vector.
$5,000 - $200,000
Non-compliance fines per month
(Depending on the card brand, the nature of non-compliance,
and the number of incidents)
Source: Focus on PCI
The Cost of Remediation
Impact of a cyber-attack
Average
Remediation
Timeframe
69%
of consumers are less likely to
shop at an organization that
has been breached
31
days
Cost per day Total price tag for a data breach
$20,000 $640,000
Source: Dark Reading, October 2014
Impact of Latest Trends on
Wi-Fi Security
802.11ac standard accounts
for 30% of access point shipments*
*Source: IDC Worldwide Quarterly WLAN Tracker, March 2015
New high-performance 802.11ac standard
creates security blind spots
30%
11n radio cannot monitor 11ac frame
formats!
IDC predicts that 28 billion connected
devices will exist by 2020* – how will
network and security professionals
cope?
IoT requires compliance officers to
address both device volume and device
diversity.
*Source: IDC Worldwide Quarterly WLAN Tracker, March 2015
Internet of Things Becoming Reality
28B
* Source: Hospitality Technology’s POS Software Trend Report 2015
** Source: BRP – POS/Customer Engagement Survey 2015
Mobile Technologies Create New
Requirements for Wi-Fi Networks
of restaurants are planning
POS upgrades to add
mobile POS and EMV*
47%
Consumers are becoming more mobile and want to pay
and access the internet from anywhere. Employees are
going mobile, too.
of retailers plan to add mobile
devices for store associates
within 2 years**
56%
Grab the Trends Infographic from SlideShare
View the infographic
Need In-depth Information?
Download white paper [PDF]: “PCI Compliance In The
New World of Threats: Do My Security Controls Achieve
Wireless PCI DSS?”
PCI DSS Wireless Requirements
DSS Section No WLAN WLAN Deployed
Scanning
Requirements
Section 11.1 Quarterly wireless scan
Section 11.4 Monitor wireless alerts
Section 12.9 Incident response plan
Security
Requirements
Section 2.1.1 Change defaults n/a
Section 4.1.1 802.11i security n/a
Section 9.1.3 Physical security n/a
Section 10.5.4 Wireless logs n/a
Section 10.6 Wireless log review n/a
Section 12.3 Usage policies n/a
Req. 9.9 – Protect POS Terminals and
Devices from Tampering
 mPOS – devices should associate to the
wireless network specific to the location.
 Guest Wi-Fi services – ensure connection
to the trusted network, not a honeypot.
How does AirTight WIPS help?
 Eliminates false positives
 Integrates with existing monitoring tools
Req. 2.4 – Maintain Inventory of System
Components in Scope for PCI
 Identify key components in the CDE
 Ensure key components are protected
 Limit scope of PCI audit
How does AirTight WIPS help?
 Inventories all wireless assets in the environment
 Separates your assets from neighboring assets
 Eliminates manual inventory methods
 Defines scope of PCI audit
Req. 10.6 – Daily Log Review
 Daily log reviews recognized as tedious
 Focus should be on suspicious activity
and actionable events/data
How does AirTight WIPS help?
 Device classification accuracy eliminates false positives
 Integrates with existing monitoring tools
Securing Large Environments
“Visual inspection” inadequate for complex environments
PCI Best Practices
1. Limit audit scope through network segmentation
2. Practice security as a continual process
3. Use strong wireless encryption and authentication
4. Use IDS/IPS to monitor traffic in the CDE
5. Implement an incident response plan
6. Establish & maintain a relationship with the auditor
Automate Your Wireless PCI Compliance
Learn
about
AirTight’s
PCI
solutions
Need In-depth Information?
Download the whitepaper [PDF] : “PCI DSS 3.1 and
the Impact on WiFi Security”
Retailers’ Plans to Update WAN/WLAN
Security
Source: IHL Group – Impact of Store Networks and Wi-Fi on
Customer Experience 2015 (sponsored by AirTight & EarthLink)
Download
the report
Security/Compliance Highest in
Wi-Fi Selection Criteria
Source: IHL Group – Impact of Store Networks and Wi-Fi on
Customer Experience 2015
Security
PCI Compliance
Centralized Control
Costs
SLAs
Vendor Reputation
Analytics/Social Media
Download the IHL Report (PDF): Impact of Store
Networks and Wi-Fi on Customer Experience
2015 Study: The Payback on Store Wi-Fi
The Roadmap to Wireless Security
Adopt behavior-based approach
Does the system
filter out only
genuine threats?
Is threat
scanning spot or
continuous?
Can the system
detect all types of
vulnerabilities?
Can the solution
automatically
contain threats?
What is Behavior-based Security?
Read about AirTight’s behavior-
based security on our blog
Are You Safe?
Schedule a FREE wireless
vulnerability assessment
More Webinars with Kevin McCauley
View on demand
View on demand
PCI DSS 3.1 Webinar on Demand
www.slideshare.net/airtight
New PCI 3.1 Guidelines Address
SSL Vulnerability via
@AirTight blog
Secure Cloud Wi-Fi for
Distributed Enterprise
Want to learn more?
Request a demo

More Related Content

More from AirTight Networks

iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check  _ Essential Considerations for an iBeacon DeploymentiBeacon Reality Check  _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check _ Essential Considerations for an iBeacon DeploymentAirTight Networks
 
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...AirTight Networks
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareAirTight Networks
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...AirTight Networks
 
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-FiMarriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-FiAirTight Networks
 
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014AirTight Networks
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23AirTight Networks
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTSAirTight Networks
 

More from AirTight Networks (10)

iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check  _ Essential Considerations for an iBeacon DeploymentiBeacon Reality Check  _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
 
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
 
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-FiMarriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
 
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
 
Appi fi
Appi fiAppi fi
Appi fi
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
 
Cafe Latte
Cafe LatteCafe Latte
Cafe Latte
 

Recently uploaded

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Do My Security Controls Achieve Wireless PCI Compliance

  • 1. Do My Security Controls Achieve Wireless PCI DSS? Compliance in the new world of threats
  • 2. You will learn about:  The cost of non-compliance  Trends impacting wireless PCI compliance  PCI DSS 3.1 standard and wireless security  PCI best practices
  • 3. Expert Speaker Kevin McCauley Director of Retail Market Development AirTight Networks
  • 4. View the webinar Do My Security Controls Achieve Wireless PCI DSS? Compliance in the new world of threats
  • 5. The Cost of Non-Compliance If your business accepts payment cards, it needs to be PCI compliant to protect customer data. Wi-Fi is a common attack vector. $5,000 - $200,000 Non-compliance fines per month (Depending on the card brand, the nature of non-compliance, and the number of incidents) Source: Focus on PCI
  • 6. The Cost of Remediation Impact of a cyber-attack Average Remediation Timeframe 69% of consumers are less likely to shop at an organization that has been breached 31 days Cost per day Total price tag for a data breach $20,000 $640,000 Source: Dark Reading, October 2014
  • 7. Impact of Latest Trends on Wi-Fi Security 802.11ac standard accounts for 30% of access point shipments* *Source: IDC Worldwide Quarterly WLAN Tracker, March 2015 New high-performance 802.11ac standard creates security blind spots 30% 11n radio cannot monitor 11ac frame formats!
  • 8. IDC predicts that 28 billion connected devices will exist by 2020* – how will network and security professionals cope? IoT requires compliance officers to address both device volume and device diversity. *Source: IDC Worldwide Quarterly WLAN Tracker, March 2015 Internet of Things Becoming Reality 28B
  • 9. * Source: Hospitality Technology’s POS Software Trend Report 2015 ** Source: BRP – POS/Customer Engagement Survey 2015 Mobile Technologies Create New Requirements for Wi-Fi Networks of restaurants are planning POS upgrades to add mobile POS and EMV* 47% Consumers are becoming more mobile and want to pay and access the internet from anywhere. Employees are going mobile, too. of retailers plan to add mobile devices for store associates within 2 years** 56%
  • 10. Grab the Trends Infographic from SlideShare View the infographic
  • 11. Need In-depth Information? Download white paper [PDF]: “PCI Compliance In The New World of Threats: Do My Security Controls Achieve Wireless PCI DSS?”
  • 12. PCI DSS Wireless Requirements DSS Section No WLAN WLAN Deployed Scanning Requirements Section 11.1 Quarterly wireless scan Section 11.4 Monitor wireless alerts Section 12.9 Incident response plan Security Requirements Section 2.1.1 Change defaults n/a Section 4.1.1 802.11i security n/a Section 9.1.3 Physical security n/a Section 10.5.4 Wireless logs n/a Section 10.6 Wireless log review n/a Section 12.3 Usage policies n/a
  • 13. Req. 9.9 – Protect POS Terminals and Devices from Tampering  mPOS – devices should associate to the wireless network specific to the location.  Guest Wi-Fi services – ensure connection to the trusted network, not a honeypot. How does AirTight WIPS help?  Eliminates false positives  Integrates with existing monitoring tools
  • 14. Req. 2.4 – Maintain Inventory of System Components in Scope for PCI  Identify key components in the CDE  Ensure key components are protected  Limit scope of PCI audit How does AirTight WIPS help?  Inventories all wireless assets in the environment  Separates your assets from neighboring assets  Eliminates manual inventory methods  Defines scope of PCI audit
  • 15. Req. 10.6 – Daily Log Review  Daily log reviews recognized as tedious  Focus should be on suspicious activity and actionable events/data How does AirTight WIPS help?  Device classification accuracy eliminates false positives  Integrates with existing monitoring tools
  • 16. Securing Large Environments “Visual inspection” inadequate for complex environments
  • 17. PCI Best Practices 1. Limit audit scope through network segmentation 2. Practice security as a continual process 3. Use strong wireless encryption and authentication 4. Use IDS/IPS to monitor traffic in the CDE 5. Implement an incident response plan 6. Establish & maintain a relationship with the auditor
  • 18. Automate Your Wireless PCI Compliance Learn about AirTight’s PCI solutions
  • 19. Need In-depth Information? Download the whitepaper [PDF] : “PCI DSS 3.1 and the Impact on WiFi Security”
  • 20. Retailers’ Plans to Update WAN/WLAN Security Source: IHL Group – Impact of Store Networks and Wi-Fi on Customer Experience 2015 (sponsored by AirTight & EarthLink) Download the report
  • 21. Security/Compliance Highest in Wi-Fi Selection Criteria Source: IHL Group – Impact of Store Networks and Wi-Fi on Customer Experience 2015 Security PCI Compliance Centralized Control Costs SLAs Vendor Reputation Analytics/Social Media
  • 22. Download the IHL Report (PDF): Impact of Store Networks and Wi-Fi on Customer Experience 2015 Study: The Payback on Store Wi-Fi
  • 23. The Roadmap to Wireless Security Adopt behavior-based approach Does the system filter out only genuine threats? Is threat scanning spot or continuous? Can the system detect all types of vulnerabilities? Can the solution automatically contain threats?
  • 24. What is Behavior-based Security? Read about AirTight’s behavior- based security on our blog Are You Safe? Schedule a FREE wireless vulnerability assessment
  • 25. More Webinars with Kevin McCauley View on demand View on demand
  • 26. PCI DSS 3.1 Webinar on Demand www.slideshare.net/airtight New PCI 3.1 Guidelines Address SSL Vulnerability via @AirTight blog
  • 27. Secure Cloud Wi-Fi for Distributed Enterprise Want to learn more? Request a demo