SlideShare a Scribd company logo
1 of 27
What’s Trending?
Payment Card Industry
Security And Compliance Round Table
Wednesday October 28, 2015
INFRAGARD
InfraGard is a partnership between the FBI and the private sector. It is an
association of persons who represent businesses, academic institutions, state
and local law enforcement agencies, and other participants dedicated to
sharing information and intelligence to prevent hostile acts against the U.S.
Disclaimer
The views, opinions, and content of this webinar are solely those of the
speakers and other contributors. These views and opinions do not necessarily
represent those of InfraGard or InfraGard Atlanta Members Alliance (IAMA).
RICHARD EMRICH
Rich has been Director of Treasury at Northwestern University since
2007. His responsibilities include management of Treasury (capital
planning, as well as long-term debt portfolio and working capital
strategy); e-Commerce operations (primary oversight of 200
merchants across two campuses and related compliance); and
Bursar operations (various card programs, remote depositing and
cashiering). Prior to joining Northwestern Rich was Global Treasury
Manager at Hewitt Associates, Inc. for 5 years and Senior IT
Manager for Hewitt Associates LLC for 6 years. During his tenure in
Finance he worked to bring Treasury into compliance with
Sarbanes-Oxley following the company’s IPO, implemented a
Treasury workstation, and managed an investment portfolio of $600
million. Rich graduated from Bates College in 1984 pre-med, then
earned his MBA in finance from the University of Illinois / Chicago.
He has been a Certified Treasury Professional (CTP) since 2005.
DR. PHILLIP HALLAM-BAKER
Phillip Hallam-Baker is a computer scientist, mostly renowned for his
contributions to Internet security, since the design of HTTP at CERN in
1992. Currently vice-president and principal scientist at Comodo Inc., he
previously worked at Verisign Inc., and at MIT Artificial Intelligence
Laboratory. He is a frequent participant in IETF meetings and discussions,
and has written a number of RFCs. In 2007 he authored the dotCrime
Manifesto: How to Stop Internet Crime. Hallam-Baker has a degree in
electronic engineering from the School of Electronics and Computer
Science, University of Southampton and a doctorate in Computer Science
from the Nuclear Physics Department at Oxford University. He was
appointed a Post Doctoral Research Associate at DESY in 1992 and CERN
Fellow in 1993. Hallam-Baker worked with the Clinton-Gore ’92 Internet
campaign. While at the MIT Laboratory for Artificial Intelligence, he
worked on developing a security plan and performed seminal work on
securing high profile Federal Government Internet sites.
TREVOR HORWITZ
Trevor Horwitz is the founder and CISO of TrustNet, a leading
specialized provider of IT Security and Compliance services. Trevor
has designed, developed, and assessed security and compliance
solutions for corporations of all sizes and across multiple industries
for over twenty years. Trevor is a PCI Qualified Security Assessor and
contributing member of the PCI Security Council’s special interest
group on virtualization and cloud security. His career experience
includes roles as the CEO of a pioneering network security company
and a senior consultant at PWC. He is a board member of InfraGard
Atlanta, past Executive Board member of ISACA Atlanta, and has
been active in the Technology Association of Georgia for over fifteen
years. Trevor holds a Bachelor of Commerce from the University of
the Witwatersrand, Johannesburg, South Africa with a triple major
in Accounting, Information Systems, and Business Law.
AGENDA
1. EMV and “Chip and Pin” Technologies
2. Mobile Payments
3. Secure Data Transmission - Migrating from SSL and Early TLS
4. Point-to-Point Encryption (P2PE)
5. PCI and the Cloud
6. Designated Entities
7. Two Factor Authentication
8. Hidden Card Holder Data and Shadow IT
Webinar Sponsor
www.TrustNetInc.com
IS PAYMENT CARD SECURITY A BIG ISSUE ?
EMV – CHIP AND PIN TECHNOLOGIES
EMV – CHIP AND PIN TECHNOLOGIES
Chip and Dale
…not the same as
Chip and Pin
MOBILE PAYMENTS
MOBILE PAYMENTS
By 2017,
cash-based transactions
will represent fewer than
25 percent of all in-store
purchases
DATA TRANSMISSION ENCRYPTION
SSL AND EARLY TLS
DATA TRANSMISSION ENCRYPTION
SSL AND EARLY TLS
Refer to NIST SP 800-52
rev 1 for guidance on
secure TLS configurations
Little Known Fact
Not all implementations of
TLS v1.1 are considered
secure
POINT-TO-POINT ENCRYPTION (P2PE)
Are merchants using PCI
approved P2PE solutions
out of scope for PCI DSS?
In a word No
POINT-TO-POINT ENCRYPTION (P2PE)
P2PE SAQ can only be
used when merchants
process cardholder data
only via hardware
payment terminals
within a validated PCI
P2PE solutionThe P2PE Self-Assessment
Questionnaire includes
only 26 PCI DSS
requirements
First draft of “Dark Side”
recruiting poster
“Most
misunderstood
villain of all time”
According to his
Mom
aka Mama Vader
PCI AND THE CLOUD
Alternate names for cloud
computing that never stuck
 Utility Computing
 Shared Resource Computing
 Pay as you go Computing
 Service-oriented Computing
PCI AND THE CLOUD
THE PANEL
Dr. Phillip Hallam-Baker Trevor Horwitz Richard Emrich
Has a cat named PhilipFriends call him Phillip Middle name is Philip
DESIGNATED ENTITY
Examples of Designated Entities
 Entities storing large amounts of cardholder
data.
 Entities providing aggregation points for
cardholder data.
 Entities suffering large-scale and/or recurring
breaches resulting in compromise of cardholder
data.
This slide complies with the “Mandatory Reference to Star Wars Act of 2015”
TWO FACTOR AUTHENTICATION
HIDDEN CARD HOLDER DATA AND
SHADOW IT
HIDDEN CARD HOLDER DATA AND
SHADOW IT
Common Methods used to
find cardholder data
 Mod10 verification
 Length/Prefix checks
 Native format decoding
 Contextual data and
statistical analysis -
What you do … What your friends think you do …
Information Security
Webinar Sponsor
www.TrustNetInc.com
Twitter @TrustNetInc
LinkedIn #TrustNetInc
For more information about InfraGard Atlanta and upcoming events:
President, Jeff Gaynor
Presiama@gmail.com
Director of Outreach, Lawrence Tobin
Lawrence.Tobin@TrustNetInc.com
www.InfraGardAtlanta.org

More Related Content

What's hot

Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills GapStephen Cobb
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) PwC France
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurityIndy Dh
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicSecunoid Systems Inc
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystemkpatrickwheeler
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Dinesh O Bareja
 
Learning from History
Learning from HistoryLearning from History
Learning from HistoryBrian Honan
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 

What's hot (20)

IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurity
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
IT compliance
IT complianceIT compliance
IT compliance
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Learning from History
Learning from HistoryLearning from History
Learning from History
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 

Similar to InfraGard Webinar October 2015 102815

HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsHispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsFernando Blasco
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfChinatu Uzuegbu
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.Merry D'souza
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsReal-Time Innovations (RTI)
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?Leonard Lee
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Digital-Enabled Wealth Management
Digital-Enabled Wealth ManagementDigital-Enabled Wealth Management
Digital-Enabled Wealth ManagementCIO Talk Network
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 

Similar to InfraGard Webinar October 2015 102815 (20)

HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsHispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Digital-Enabled Wealth Management
Digital-Enabled Wealth ManagementDigital-Enabled Wealth Management
Digital-Enabled Wealth Management
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 

InfraGard Webinar October 2015 102815

  • 1. What’s Trending? Payment Card Industry Security And Compliance Round Table Wednesday October 28, 2015
  • 2. INFRAGARD InfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S. Disclaimer The views, opinions, and content of this webinar are solely those of the speakers and other contributors. These views and opinions do not necessarily represent those of InfraGard or InfraGard Atlanta Members Alliance (IAMA).
  • 3. RICHARD EMRICH Rich has been Director of Treasury at Northwestern University since 2007. His responsibilities include management of Treasury (capital planning, as well as long-term debt portfolio and working capital strategy); e-Commerce operations (primary oversight of 200 merchants across two campuses and related compliance); and Bursar operations (various card programs, remote depositing and cashiering). Prior to joining Northwestern Rich was Global Treasury Manager at Hewitt Associates, Inc. for 5 years and Senior IT Manager for Hewitt Associates LLC for 6 years. During his tenure in Finance he worked to bring Treasury into compliance with Sarbanes-Oxley following the company’s IPO, implemented a Treasury workstation, and managed an investment portfolio of $600 million. Rich graduated from Bates College in 1984 pre-med, then earned his MBA in finance from the University of Illinois / Chicago. He has been a Certified Treasury Professional (CTP) since 2005.
  • 4. DR. PHILLIP HALLAM-BAKER Phillip Hallam-Baker is a computer scientist, mostly renowned for his contributions to Internet security, since the design of HTTP at CERN in 1992. Currently vice-president and principal scientist at Comodo Inc., he previously worked at Verisign Inc., and at MIT Artificial Intelligence Laboratory. He is a frequent participant in IETF meetings and discussions, and has written a number of RFCs. In 2007 he authored the dotCrime Manifesto: How to Stop Internet Crime. Hallam-Baker has a degree in electronic engineering from the School of Electronics and Computer Science, University of Southampton and a doctorate in Computer Science from the Nuclear Physics Department at Oxford University. He was appointed a Post Doctoral Research Associate at DESY in 1992 and CERN Fellow in 1993. Hallam-Baker worked with the Clinton-Gore ’92 Internet campaign. While at the MIT Laboratory for Artificial Intelligence, he worked on developing a security plan and performed seminal work on securing high profile Federal Government Internet sites.
  • 5. TREVOR HORWITZ Trevor Horwitz is the founder and CISO of TrustNet, a leading specialized provider of IT Security and Compliance services. Trevor has designed, developed, and assessed security and compliance solutions for corporations of all sizes and across multiple industries for over twenty years. Trevor is a PCI Qualified Security Assessor and contributing member of the PCI Security Council’s special interest group on virtualization and cloud security. His career experience includes roles as the CEO of a pioneering network security company and a senior consultant at PWC. He is a board member of InfraGard Atlanta, past Executive Board member of ISACA Atlanta, and has been active in the Technology Association of Georgia for over fifteen years. Trevor holds a Bachelor of Commerce from the University of the Witwatersrand, Johannesburg, South Africa with a triple major in Accounting, Information Systems, and Business Law.
  • 6. AGENDA 1. EMV and “Chip and Pin” Technologies 2. Mobile Payments 3. Secure Data Transmission - Migrating from SSL and Early TLS 4. Point-to-Point Encryption (P2PE) 5. PCI and the Cloud 6. Designated Entities 7. Two Factor Authentication 8. Hidden Card Holder Data and Shadow IT Webinar Sponsor www.TrustNetInc.com
  • 7. IS PAYMENT CARD SECURITY A BIG ISSUE ?
  • 8. EMV – CHIP AND PIN TECHNOLOGIES
  • 9. EMV – CHIP AND PIN TECHNOLOGIES Chip and Dale …not the same as Chip and Pin
  • 11. MOBILE PAYMENTS By 2017, cash-based transactions will represent fewer than 25 percent of all in-store purchases
  • 13. DATA TRANSMISSION ENCRYPTION SSL AND EARLY TLS Refer to NIST SP 800-52 rev 1 for guidance on secure TLS configurations Little Known Fact Not all implementations of TLS v1.1 are considered secure
  • 14. POINT-TO-POINT ENCRYPTION (P2PE) Are merchants using PCI approved P2PE solutions out of scope for PCI DSS? In a word No
  • 15. POINT-TO-POINT ENCRYPTION (P2PE) P2PE SAQ can only be used when merchants process cardholder data only via hardware payment terminals within a validated PCI P2PE solutionThe P2PE Self-Assessment Questionnaire includes only 26 PCI DSS requirements
  • 16. First draft of “Dark Side” recruiting poster “Most misunderstood villain of all time” According to his Mom aka Mama Vader
  • 17. PCI AND THE CLOUD Alternate names for cloud computing that never stuck  Utility Computing  Shared Resource Computing  Pay as you go Computing  Service-oriented Computing
  • 18. PCI AND THE CLOUD
  • 19. THE PANEL Dr. Phillip Hallam-Baker Trevor Horwitz Richard Emrich Has a cat named PhilipFriends call him Phillip Middle name is Philip
  • 20. DESIGNATED ENTITY Examples of Designated Entities  Entities storing large amounts of cardholder data.  Entities providing aggregation points for cardholder data.  Entities suffering large-scale and/or recurring breaches resulting in compromise of cardholder data.
  • 21. This slide complies with the “Mandatory Reference to Star Wars Act of 2015”
  • 23. HIDDEN CARD HOLDER DATA AND SHADOW IT
  • 24. HIDDEN CARD HOLDER DATA AND SHADOW IT Common Methods used to find cardholder data  Mod10 verification  Length/Prefix checks  Native format decoding  Contextual data and statistical analysis -
  • 25. What you do … What your friends think you do … Information Security
  • 27. For more information about InfraGard Atlanta and upcoming events: President, Jeff Gaynor Presiama@gmail.com Director of Outreach, Lawrence Tobin Lawrence.Tobin@TrustNetInc.com www.InfraGardAtlanta.org