SlideShare a Scribd company logo
From Bad to Worse: How to Stay Protected from a Mega Data Breach 
Presenter: Jennifer Rossi, Vice President , Channel Sales, Paymetric 
October 3, 2014 ©2014. Paymetric. All Rights Reserved. 1
Webinar Agenda 
 About Paymetric 
 Data Breaches in the News 
 Data Breach Impact and Cost 
 The Myth of the “Silver Bullet” 
 Prevailing PCI Solution Options 
 Tokenization Technology 
 Five Best Practices for an SAP-based Enterprise 
October 3, 2014 
2 
©2014. Paymetric. All Rights Reserved.
About Paymetric 
October 3, 2014 
3 
©2014. Paymetric. All Rights Reserved.
Award-Winning Company 
Paymetric is Recognized for Electronic Payments Innovation 
Paymetric is an award-winning company built on 
shared purpose, an unremitting pursuit of excellence, 
lasting collaboration, accountability and integrity. For 
more than 15 years, we have been recognized for our 
work and honored with awards for technical innovation 
and thought leadership. 
October 3, 2014 
4 
©2014. Paymetric. All Rights Reserved.
Data Breaches in the News 
• More than 37 percent of data breach incidents involved a malicious or 
criminal attack 
• 35 percent of data breach incidents involved a negligent employee or 
contractor (human factor) 
• 29 percent of data breach incidents involved system glitches that 
includes both IT and business process failures 
October 3, 2014 
5 
©2014. Paymetric. All Rights Reserved. 
*Distribution of the benchmark sample by root cause of the data breach 
Human factor 
Malicious or criminal attack 
System glitches 
Source: Ponemon Institute
Data Breach Impact and Cost 
October 3, 2014 
6 
©2014. Paymetric. All Rights Reserved. 
Source: Ponemon Institute 2013 Cost of Data Breach Study: Global Analysis 
Overview 
 Dollars spent per data record when 
there is a data breach 
 All industries are at risk, even 
though Retail makes the news 
the most 
 Healthcare breaches are the most 
expensive by far due to personal 
identifiable data (PII) being exposed
The Impact to Your Organization 
 Fines and Litigation 
 Cost of investigation and audit 
 Loss of business/customer trust 
 Potential decline in share value 
 Brand reputation 
October 3, 2014 
7 
©2014. Paymetric. All Rights Reserved.
Getting Negative 
Dominant industry rule of thumb: 
1. There is no “silver bullet” single solution to prevent 
a data breach 
2. It is not “if”, but “when” you will be breached 
So, now what? 
October 3, 2014 
8 
©2014. Paymetric. All Rights Reserved.
So, Now What? 
• Thieves cannot steal what is no longer there to 
steal 
– i.e. Render what is left in the system...worthless 
• Even if they can see it and exfiltrate it, they 
cannot use it outside of the merchant 
• Understand the prevailing PCI solutions 
– Tokenization 
– P2PE 
– EMV 
October 3, 2014 
9 
©2014. Paymetric. All Rights Reserved.
Prevailing PCI Solution Options 
PCI solutions and their primary application scenario 
October 3, 2014 
10 
©2014. Paymetric. All Rights Reserved. 
Ecommerce 
(CNP) 
Call Center 
(CNP: MOTO) 
Retail 
(CP) 
Tokenization ✔ ✔ ✔ 
P2PE ✔ 
EMV ✔ 
Most SAP-based 
Enterprise Environments
What is Tokenization? 
• A token is a substitute value: sensitive data is replaced with data that is of no value to 
hackers or thieves 
• Protected systems no longer store the RAW sensitive or encrypted data 
• Unlike encryption – tokens can’t be reverse engineered to the original data 
• Tokens are not mathematically created; they are random 
• If system is compromised the real data can’t be taken, only tokens 
October 3, 2014 
11 
©2014. Paymetric. All Rights Reserved.
Tokens for the Enterprise 
 Multi-use token 
 Same data  same token 
 Data consistency for secure reporting, queries, customer service 
 Usable parts of the original data retained in the token 
 Token has business meaning so processes continue securely 
 Token retains permitted parts of the original, e.g. last 4 digits of a 
credit card 
 Tokenize only what is needed 
 Tokenize the sensitive data only 
 Enterprise retains full control of separate data fields 
 A neutral credit card token vault 
 Token is NOT processor specific 
October 3, 2014 
12 
©2014. Paymetric. All Rights Reserved.
Tokenize at the Edge; Then Share & Reuse 
October 3, 2014 
13 
©2014. Paymetric. All Rights Reserved. 
WEB 
CRM ERP
Tokens Protect More Than Card Data 
 PII is information that can be used uniquely or with other 
sources to identify, contact or locate a single person. For 
example: 
 Social Security Number 
 Bank Account 
 Email 
 Drivers License Number 
 PII Tokenization 
 Format Preserving Tokens 
 Protect PII Affordably 
 Achieve Safe Harbor from Data Breach Notifications Laws 
 Employee, vendor and customer data 
October 3, 2014 
14 
©2014. Paymetric. All Rights Reserved.
An Overview of Card Tokenization Technology 
Encryption 
Centralized/ 
Non-centralized 
October 3, 2014 
15 
©2014. Paymetric. All Rights Reserved.
5 Best Practices for an SAP-based Enterprise 
Encryption 
Centralized/ 
Non-centralized 
October 3, 2014 
16 
©2014. Paymetric. All Rights Reserved.
#1: Understand Enterprise Decision Drivers 
October 3, 2014 
17 
©2014. Paymetric. All Rights Reserved. 
Project 
Priority, 
Budget & 
Visibility 
C-Level Visibility 
PCI DSS Compliance 
Internal Security & 
Compliance Team 
Risk Mitigation 
Brand 
Reputation/Customer 
Perception 
PII Protection
#2: Identify the Enterprise Risk Workflows 
Identify workflows, entry points and use 
cases where payment cards are being 
used 
October 3, 2014 
18 
©2014. Paymetric. All Rights Reserved.
#3: Protect Data in Transit and at Entry 
October 3, 2014 
19 
©2014. Paymetric. All Rights Reserved. 
Once you understand the 
workflows – now understand 
what data is in those workflows 
• Is data at rest, at entry, and 
in transit? 
• Where is it entered? 
• Where is it being 
transmitted – 
communicated? 
• Where is it being stored?
#4: Avoid Technology Lock-In 
• Focus on being processor agnostic 
• Keep your options open 
• Avoid processor lock in 
• Separate processing requirements from security requirements 
• This allows you to be covered for expansion and change – be able to 
scale up for security and payments 
October 3, 2014 
20 
©2014. Paymetric. All Rights Reserved.
#5: Understand Your C-Level Criteria 
• Increased breach activity has brought new players into the payment 
security space 
• Payment security is critical to the enterprise 
– Getting this wrong has serious impact 
• What are your C-Level vendor selection criteria for this mission critical 
solution? 
– Vendor product suite functionality? 
– Vendor and product scalability? 
– Vendor technology investment? 
– Vendor resource focus? 
– Vendor experience and reputation? 
– Vendor stability? 
– Vendor cost? 
October 3, 2014 
21 
©2014. Paymetric. All Rights Reserved.
Best Practice Summary 
①Understand Enterprise Decision Drivers 
②Identify the Enterprise Risk Workflows 
③ Protect Data in Transit and at Entry (& Stored Data) 
④ Avoid Technology Lock-In 
⑤ Understand Your C-level Criteria 
October 3, 2014 
22 
©2014. Paymetric. All Rights Reserved.
Questions? Contact our presenter: 
October 3, 2014 
23 
©2014. Paymetric. All Rights Reserved.

More Related Content

What's hot

Wealth Management in Asia - Webinar
Wealth Management in Asia - WebinarWealth Management in Asia - Webinar
Wealth Management in Asia - Webinar
Sopra Banking Software
 
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Stephanie Gutowski
 
[WSO2Con EU 2017] Fraud Prevention and Compliance in Financial Sector with WS...
[WSO2Con EU 2017] Fraud Prevention and Compliance in Financial Sector with WS...[WSO2Con EU 2017] Fraud Prevention and Compliance in Financial Sector with WS...
[WSO2Con EU 2017] Fraud Prevention and Compliance in Financial Sector with WS...
WSO2
 
Horizon_Brochure
Horizon_BrochureHorizon_Brochure
Horizon_Brochure
Omar Tarish
 
CardConnect Merchant Pricing Proposal
CardConnect Merchant Pricing ProposalCardConnect Merchant Pricing Proposal
CardConnect Merchant Pricing Proposal
Tony Shap
 
How a Payment Factory can help reduce the cost of your ERP cloud migration
How a Payment Factory can help reduce the cost of your ERP cloud migrationHow a Payment Factory can help reduce the cost of your ERP cloud migration
How a Payment Factory can help reduce the cost of your ERP cloud migration
Kyriba Corporation
 
2020 kyriba payment_network
2020 kyriba payment_network2020 kyriba payment_network
2020 kyriba payment_network
Chris-Marty MABELLA
 
3-D Secure Acquirer and Merchant Implementation Guide
3-D Secure Acquirer and Merchant Implementation Guide3-D Secure Acquirer and Merchant Implementation Guide
3-D Secure Acquirer and Merchant Implementation Guide
- Mark - Fullbright
 
PSD2: Open Banking with APIs
PSD2: Open Banking with APIsPSD2: Open Banking with APIs
PSD2: Open Banking with APIs
Jason Bloomberg
 
Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101
ntel
 
How Data is Revolutionizing Authentication
How Data is Revolutionizing AuthenticationHow Data is Revolutionizing Authentication
How Data is Revolutionizing Authentication
CardinalCommerce
 
TD - uLaw Payment Integration
TD - uLaw Payment IntegrationTD - uLaw Payment Integration
TD - uLaw Payment Integration
uLawPractice Jillian Lim
 
Solve B2B Payment Problems by Eliminating Checks, Reducing Risk & Saving Mone...
Solve B2B Payment Problems by Eliminating Checks, Reducing Risk & Saving Mone...Solve B2B Payment Problems by Eliminating Checks, Reducing Risk & Saving Mone...
Solve B2B Payment Problems by Eliminating Checks, Reducing Risk & Saving Mone...
SAP Ariba
 
3-D Secure and MPI Integrations
3-D Secure and MPI Integrations3-D Secure and MPI Integrations
3-D Secure and MPI Integrations
UnitedThinkers
 
Corporate Prepaid - Can you system deliver? | Prepaid Summit Europe Milan 2014
Corporate Prepaid - Can you system deliver? | Prepaid Summit Europe Milan 2014Corporate Prepaid - Can you system deliver? | Prepaid Summit Europe Milan 2014
Corporate Prepaid - Can you system deliver? | Prepaid Summit Europe Milan 2014
Ixaris Systems
 
Paynet systems & Credit Card Processing
Paynet systems & Credit Card ProcessingPaynet systems & Credit Card Processing
Paynet systems & Credit Card Processing
Paynet Systems, Inc.
 
Receivables Financing ➢ Accounts Receivable Financing ↖o↗ Receivable Financin...
Receivables Financing ➢ Accounts Receivable Financing ↖o↗ Receivable Financin...Receivables Financing ➢ Accounts Receivable Financing ↖o↗ Receivable Financin...
Receivables Financing ➢ Accounts Receivable Financing ↖o↗ Receivable Financin...
M1xchange
 
Flux PayDirect NACH IndusInd Bank Case Study
Flux PayDirect NACH IndusInd Bank Case StudyFlux PayDirect NACH IndusInd Bank Case Study
Flux PayDirect NACH IndusInd Bank Case Study
evolvus
 
Banking & Lending AI Use Cases
Banking & Lending AI Use CasesBanking & Lending AI Use Cases
Banking & Lending AI Use Cases
Artivatic.ai
 

What's hot (19)

Wealth Management in Asia - Webinar
Wealth Management in Asia - WebinarWealth Management in Asia - Webinar
Wealth Management in Asia - Webinar
 
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
 
[WSO2Con EU 2017] Fraud Prevention and Compliance in Financial Sector with WS...
[WSO2Con EU 2017] Fraud Prevention and Compliance in Financial Sector with WS...[WSO2Con EU 2017] Fraud Prevention and Compliance in Financial Sector with WS...
[WSO2Con EU 2017] Fraud Prevention and Compliance in Financial Sector with WS...
 
Horizon_Brochure
Horizon_BrochureHorizon_Brochure
Horizon_Brochure
 
CardConnect Merchant Pricing Proposal
CardConnect Merchant Pricing ProposalCardConnect Merchant Pricing Proposal
CardConnect Merchant Pricing Proposal
 
How a Payment Factory can help reduce the cost of your ERP cloud migration
How a Payment Factory can help reduce the cost of your ERP cloud migrationHow a Payment Factory can help reduce the cost of your ERP cloud migration
How a Payment Factory can help reduce the cost of your ERP cloud migration
 
2020 kyriba payment_network
2020 kyriba payment_network2020 kyriba payment_network
2020 kyriba payment_network
 
3-D Secure Acquirer and Merchant Implementation Guide
3-D Secure Acquirer and Merchant Implementation Guide3-D Secure Acquirer and Merchant Implementation Guide
3-D Secure Acquirer and Merchant Implementation Guide
 
PSD2: Open Banking with APIs
PSD2: Open Banking with APIsPSD2: Open Banking with APIs
PSD2: Open Banking with APIs
 
Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101
 
How Data is Revolutionizing Authentication
How Data is Revolutionizing AuthenticationHow Data is Revolutionizing Authentication
How Data is Revolutionizing Authentication
 
TD - uLaw Payment Integration
TD - uLaw Payment IntegrationTD - uLaw Payment Integration
TD - uLaw Payment Integration
 
Solve B2B Payment Problems by Eliminating Checks, Reducing Risk & Saving Mone...
Solve B2B Payment Problems by Eliminating Checks, Reducing Risk & Saving Mone...Solve B2B Payment Problems by Eliminating Checks, Reducing Risk & Saving Mone...
Solve B2B Payment Problems by Eliminating Checks, Reducing Risk & Saving Mone...
 
3-D Secure and MPI Integrations
3-D Secure and MPI Integrations3-D Secure and MPI Integrations
3-D Secure and MPI Integrations
 
Corporate Prepaid - Can you system deliver? | Prepaid Summit Europe Milan 2014
Corporate Prepaid - Can you system deliver? | Prepaid Summit Europe Milan 2014Corporate Prepaid - Can you system deliver? | Prepaid Summit Europe Milan 2014
Corporate Prepaid - Can you system deliver? | Prepaid Summit Europe Milan 2014
 
Paynet systems & Credit Card Processing
Paynet systems & Credit Card ProcessingPaynet systems & Credit Card Processing
Paynet systems & Credit Card Processing
 
Receivables Financing ➢ Accounts Receivable Financing ↖o↗ Receivable Financin...
Receivables Financing ➢ Accounts Receivable Financing ↖o↗ Receivable Financin...Receivables Financing ➢ Accounts Receivable Financing ↖o↗ Receivable Financin...
Receivables Financing ➢ Accounts Receivable Financing ↖o↗ Receivable Financin...
 
Flux PayDirect NACH IndusInd Bank Case Study
Flux PayDirect NACH IndusInd Bank Case StudyFlux PayDirect NACH IndusInd Bank Case Study
Flux PayDirect NACH IndusInd Bank Case Study
 
Banking & Lending AI Use Cases
Banking & Lending AI Use CasesBanking & Lending AI Use Cases
Banking & Lending AI Use Cases
 

Viewers also liked

Seahenge
SeahengeSeahenge
Mt St Helens
Mt St HelensMt St Helens
Pc i khan pur fery project 12 m
Pc i khan pur fery project 12 mPc i khan pur fery project 12 m
Pc i khan pur fery project 12 m
hayat alishah
 
Pc i festival traditional events 2014-15 50m
Pc i festival traditional events 2014-15 50mPc i festival traditional events 2014-15 50m
Pc i festival traditional events 2014-15 50m
hayat alishah
 
ZEYTİNBURNU DEMİRDÖKÜM KOMBİ SERVİSİ_0212 472 72 23_0541 872 72 23
ZEYTİNBURNU DEMİRDÖKÜM KOMBİ SERVİSİ_0212 472 72 23_0541 872 72 23ZEYTİNBURNU DEMİRDÖKÜM KOMBİ SERVİSİ_0212 472 72 23_0541 872 72 23
ZEYTİNBURNU DEMİRDÖKÜM KOMBİ SERVİSİ_0212 472 72 23_0541 872 72 23
sdfhj
 
The business of bollywood
The business of bollywoodThe business of bollywood
The business of bollywood
shashankdestiny
 
Md if tourism ismdmspstc160108
Md if tourism ismdmspstc160108Md if tourism ismdmspstc160108
Md if tourism ismdmspstc160108
hayat alishah
 
Mesolithic
MesolithicMesolithic
Chart of activities
Chart of activitiesChart of activities
Chart of activities
hayat alishah
 
Lentejas
LentejasLentejas
Lentejas
Anabel Arone
 
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...
Đông y Thọ Xuân Đường
 
zeytinburnu protherm kombi servisi_0212 472 72 23_0541 872 72 23
zeytinburnu protherm kombi servisi_0212 472 72 23_0541 872 72 23zeytinburnu protherm kombi servisi_0212 472 72 23_0541 872 72 23
zeytinburnu protherm kombi servisi_0212 472 72 23_0541 872 72 23
sdfhj
 
Adp 2015 16 2
Adp 2015 16 2Adp 2015 16 2
Adp 2015 16 2
hayat alishah
 

Viewers also liked (14)

Seahenge
SeahengeSeahenge
Seahenge
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mt St Helens
Mt St HelensMt St Helens
Mt St Helens
 
Pc i khan pur fery project 12 m
Pc i khan pur fery project 12 mPc i khan pur fery project 12 m
Pc i khan pur fery project 12 m
 
Pc i festival traditional events 2014-15 50m
Pc i festival traditional events 2014-15 50mPc i festival traditional events 2014-15 50m
Pc i festival traditional events 2014-15 50m
 
ZEYTİNBURNU DEMİRDÖKÜM KOMBİ SERVİSİ_0212 472 72 23_0541 872 72 23
ZEYTİNBURNU DEMİRDÖKÜM KOMBİ SERVİSİ_0212 472 72 23_0541 872 72 23ZEYTİNBURNU DEMİRDÖKÜM KOMBİ SERVİSİ_0212 472 72 23_0541 872 72 23
ZEYTİNBURNU DEMİRDÖKÜM KOMBİ SERVİSİ_0212 472 72 23_0541 872 72 23
 
The business of bollywood
The business of bollywoodThe business of bollywood
The business of bollywood
 
Md if tourism ismdmspstc160108
Md if tourism ismdmspstc160108Md if tourism ismdmspstc160108
Md if tourism ismdmspstc160108
 
Mesolithic
MesolithicMesolithic
Mesolithic
 
Chart of activities
Chart of activitiesChart of activities
Chart of activities
 
Lentejas
LentejasLentejas
Lentejas
 
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...
 
zeytinburnu protherm kombi servisi_0212 472 72 23_0541 872 72 23
zeytinburnu protherm kombi servisi_0212 472 72 23_0541 872 72 23zeytinburnu protherm kombi servisi_0212 472 72 23_0541 872 72 23
zeytinburnu protherm kombi servisi_0212 472 72 23_0541 872 72 23
 
Adp 2015 16 2
Adp 2015 16 2Adp 2015 16 2
Adp 2015 16 2
 

Similar to From Bad to Worse: How to Stay Protected from a Mega Data Breach

Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
Hortonworks
 
The Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card Data
Tyler Hannan
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
Sarah Fane
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist, LLC
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
Guardian Analytics
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
DLT Solutions
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
Rochester Software Associates
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
Anil Jain
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
IJERA Editor
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
Aankur Gupta
 
Experiment
ExperimentExperiment
Experiment
jbashask
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Perficient, Inc.
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
Nigel Robinson
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
accenture
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
Accenture Technology
 
Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee
 
ForMotiv - InsurTech Innovation Award 2022
ForMotiv - InsurTech Innovation Award 2022ForMotiv - InsurTech Innovation Award 2022
ForMotiv - InsurTech Innovation Award 2022
The Digital Insurer
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach world
Laurent Pacalin
 

Similar to From Bad to Worse: How to Stay Protected from a Mega Data Breach (20)

Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
 
The Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card Data
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
 
Experiment
ExperimentExperiment
Experiment
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24
 
ForMotiv - InsurTech Innovation Award 2022
ForMotiv - InsurTech Innovation Award 2022ForMotiv - InsurTech Innovation Award 2022
ForMotiv - InsurTech Innovation Award 2022
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach world
 

Recently uploaded

Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
Enhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: IntroductionEnhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: Introduction
Cor Verdouw
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
BBPMedia1
 
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Stone Art Hub
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
CULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for dukeCULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for duke
ZevinAttisha
 
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Niswey
 
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
essorprof62
 
The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
JoeYangGreatMachiner
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
Kalyan Chart Satta Matka Dpboss Kalyan Matka Results
Kalyan Chart Satta Matka Dpboss Kalyan Matka ResultsKalyan Chart Satta Matka Dpboss Kalyan Matka Results
Kalyan Chart Satta Matka Dpboss Kalyan Matka Results
Satta Matka Dpboss Kalyan Matka Results
 
Kirill Klip GEM Royalty TNR Gold Copper Presentation
Kirill Klip GEM Royalty TNR Gold Copper PresentationKirill Klip GEM Royalty TNR Gold Copper Presentation
Kirill Klip GEM Royalty TNR Gold Copper Presentation
Kirill Klip
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15
advik4387
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
Arijit Dutta
 
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
Cambridge Product Management Network
 
8328958814KALYAN MATKA | MATKA RESULT | KALYAN
8328958814KALYAN MATKA | MATKA RESULT | KALYAN8328958814KALYAN MATKA | MATKA RESULT | KALYAN
8328958814KALYAN MATKA | MATKA RESULT | KALYAN
➑➌➋➑➒➎➑➑➊➍
 

Recently uploaded (20)

Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
Enhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: IntroductionEnhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: Introduction
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
 
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
 
CULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for dukeCULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for duke
 
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
 
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
 
The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
Kalyan Chart Satta Matka Dpboss Kalyan Matka Results
Kalyan Chart Satta Matka Dpboss Kalyan Matka ResultsKalyan Chart Satta Matka Dpboss Kalyan Matka Results
Kalyan Chart Satta Matka Dpboss Kalyan Matka Results
 
Kirill Klip GEM Royalty TNR Gold Copper Presentation
Kirill Klip GEM Royalty TNR Gold Copper PresentationKirill Klip GEM Royalty TNR Gold Copper Presentation
Kirill Klip GEM Royalty TNR Gold Copper Presentation
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
 
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
 
8328958814KALYAN MATKA | MATKA RESULT | KALYAN
8328958814KALYAN MATKA | MATKA RESULT | KALYAN8328958814KALYAN MATKA | MATKA RESULT | KALYAN
8328958814KALYAN MATKA | MATKA RESULT | KALYAN
 

From Bad to Worse: How to Stay Protected from a Mega Data Breach

  • 1. From Bad to Worse: How to Stay Protected from a Mega Data Breach Presenter: Jennifer Rossi, Vice President , Channel Sales, Paymetric October 3, 2014 ©2014. Paymetric. All Rights Reserved. 1
  • 2. Webinar Agenda  About Paymetric  Data Breaches in the News  Data Breach Impact and Cost  The Myth of the “Silver Bullet”  Prevailing PCI Solution Options  Tokenization Technology  Five Best Practices for an SAP-based Enterprise October 3, 2014 2 ©2014. Paymetric. All Rights Reserved.
  • 3. About Paymetric October 3, 2014 3 ©2014. Paymetric. All Rights Reserved.
  • 4. Award-Winning Company Paymetric is Recognized for Electronic Payments Innovation Paymetric is an award-winning company built on shared purpose, an unremitting pursuit of excellence, lasting collaboration, accountability and integrity. For more than 15 years, we have been recognized for our work and honored with awards for technical innovation and thought leadership. October 3, 2014 4 ©2014. Paymetric. All Rights Reserved.
  • 5. Data Breaches in the News • More than 37 percent of data breach incidents involved a malicious or criminal attack • 35 percent of data breach incidents involved a negligent employee or contractor (human factor) • 29 percent of data breach incidents involved system glitches that includes both IT and business process failures October 3, 2014 5 ©2014. Paymetric. All Rights Reserved. *Distribution of the benchmark sample by root cause of the data breach Human factor Malicious or criminal attack System glitches Source: Ponemon Institute
  • 6. Data Breach Impact and Cost October 3, 2014 6 ©2014. Paymetric. All Rights Reserved. Source: Ponemon Institute 2013 Cost of Data Breach Study: Global Analysis Overview  Dollars spent per data record when there is a data breach  All industries are at risk, even though Retail makes the news the most  Healthcare breaches are the most expensive by far due to personal identifiable data (PII) being exposed
  • 7. The Impact to Your Organization  Fines and Litigation  Cost of investigation and audit  Loss of business/customer trust  Potential decline in share value  Brand reputation October 3, 2014 7 ©2014. Paymetric. All Rights Reserved.
  • 8. Getting Negative Dominant industry rule of thumb: 1. There is no “silver bullet” single solution to prevent a data breach 2. It is not “if”, but “when” you will be breached So, now what? October 3, 2014 8 ©2014. Paymetric. All Rights Reserved.
  • 9. So, Now What? • Thieves cannot steal what is no longer there to steal – i.e. Render what is left in the system...worthless • Even if they can see it and exfiltrate it, they cannot use it outside of the merchant • Understand the prevailing PCI solutions – Tokenization – P2PE – EMV October 3, 2014 9 ©2014. Paymetric. All Rights Reserved.
  • 10. Prevailing PCI Solution Options PCI solutions and their primary application scenario October 3, 2014 10 ©2014. Paymetric. All Rights Reserved. Ecommerce (CNP) Call Center (CNP: MOTO) Retail (CP) Tokenization ✔ ✔ ✔ P2PE ✔ EMV ✔ Most SAP-based Enterprise Environments
  • 11. What is Tokenization? • A token is a substitute value: sensitive data is replaced with data that is of no value to hackers or thieves • Protected systems no longer store the RAW sensitive or encrypted data • Unlike encryption – tokens can’t be reverse engineered to the original data • Tokens are not mathematically created; they are random • If system is compromised the real data can’t be taken, only tokens October 3, 2014 11 ©2014. Paymetric. All Rights Reserved.
  • 12. Tokens for the Enterprise  Multi-use token  Same data  same token  Data consistency for secure reporting, queries, customer service  Usable parts of the original data retained in the token  Token has business meaning so processes continue securely  Token retains permitted parts of the original, e.g. last 4 digits of a credit card  Tokenize only what is needed  Tokenize the sensitive data only  Enterprise retains full control of separate data fields  A neutral credit card token vault  Token is NOT processor specific October 3, 2014 12 ©2014. Paymetric. All Rights Reserved.
  • 13. Tokenize at the Edge; Then Share & Reuse October 3, 2014 13 ©2014. Paymetric. All Rights Reserved. WEB CRM ERP
  • 14. Tokens Protect More Than Card Data  PII is information that can be used uniquely or with other sources to identify, contact or locate a single person. For example:  Social Security Number  Bank Account  Email  Drivers License Number  PII Tokenization  Format Preserving Tokens  Protect PII Affordably  Achieve Safe Harbor from Data Breach Notifications Laws  Employee, vendor and customer data October 3, 2014 14 ©2014. Paymetric. All Rights Reserved.
  • 15. An Overview of Card Tokenization Technology Encryption Centralized/ Non-centralized October 3, 2014 15 ©2014. Paymetric. All Rights Reserved.
  • 16. 5 Best Practices for an SAP-based Enterprise Encryption Centralized/ Non-centralized October 3, 2014 16 ©2014. Paymetric. All Rights Reserved.
  • 17. #1: Understand Enterprise Decision Drivers October 3, 2014 17 ©2014. Paymetric. All Rights Reserved. Project Priority, Budget & Visibility C-Level Visibility PCI DSS Compliance Internal Security & Compliance Team Risk Mitigation Brand Reputation/Customer Perception PII Protection
  • 18. #2: Identify the Enterprise Risk Workflows Identify workflows, entry points and use cases where payment cards are being used October 3, 2014 18 ©2014. Paymetric. All Rights Reserved.
  • 19. #3: Protect Data in Transit and at Entry October 3, 2014 19 ©2014. Paymetric. All Rights Reserved. Once you understand the workflows – now understand what data is in those workflows • Is data at rest, at entry, and in transit? • Where is it entered? • Where is it being transmitted – communicated? • Where is it being stored?
  • 20. #4: Avoid Technology Lock-In • Focus on being processor agnostic • Keep your options open • Avoid processor lock in • Separate processing requirements from security requirements • This allows you to be covered for expansion and change – be able to scale up for security and payments October 3, 2014 20 ©2014. Paymetric. All Rights Reserved.
  • 21. #5: Understand Your C-Level Criteria • Increased breach activity has brought new players into the payment security space • Payment security is critical to the enterprise – Getting this wrong has serious impact • What are your C-Level vendor selection criteria for this mission critical solution? – Vendor product suite functionality? – Vendor and product scalability? – Vendor technology investment? – Vendor resource focus? – Vendor experience and reputation? – Vendor stability? – Vendor cost? October 3, 2014 21 ©2014. Paymetric. All Rights Reserved.
  • 22. Best Practice Summary ①Understand Enterprise Decision Drivers ②Identify the Enterprise Risk Workflows ③ Protect Data in Transit and at Entry (& Stored Data) ④ Avoid Technology Lock-In ⑤ Understand Your C-level Criteria October 3, 2014 22 ©2014. Paymetric. All Rights Reserved.
  • 23. Questions? Contact our presenter: October 3, 2014 23 ©2014. Paymetric. All Rights Reserved.

Editor's Notes

  1. Dollar’s spent per record when there is a data breach All Industries are at risk Retail – everyone talks about The other industries far worse with costs.
  2. You have to take the security position that you will be breached at some point. Internally or Externally. Take conservative security approach – Evaluate data you have stored. Ensure if someone can get to it make sure it’s worthless. Every breach 1.) Getting in 2.) Getting Data Out 3.) Selling it on the market EMV – Europay Mastercard Visa () – PIN enabled – Will sometimes be relevant 95% of ERP based environments will use tokenization – most don’t have retail so EMV is not relevant – not focusing on retail in this presentation P2PE = tokenization and P2PE can work togeher – mostly relevant for retail. Can be relevant to call centers but we do not have a product. Focus on Tokenization – Always relevant for ERP environments.
  3. Not mathematically created – just a random reference number – this is why a token can not be reverse engineered back to a raw card.
  4. For your enterprise – you are looing for these key characteristics and best practices for tokens Multi use – data consistency Usable parts for humans to interact with it – “Last for digits” Do not tokenize more than you need to Do not tie to a processor – leave free for flexibility to change processors
  5. Tokenize at the edge and then multiple systems can be used
  6. PII – Personally Identifiable Information We are tokenizing for several customers – increasing interest There is a trend of increasing interest
  7. Create tokenization layer/Bubble – tokenize at the edge so that any payments communications programs use the tokens Protected zone
  8. This is how you get a successful project. Internally you have identified all the right requirements – how do you get this sold internatlly – and get the project happening. Understand what your drivers are – efficiency, security? That’s what will drive project and budget Identify workflows
  9. Focus on processor agnostic Keep options open Avoid processor lock in Separate processing requirements from security requirements – keep agile from each other but working together. This allows you to be covered for expansion and change – be able to scale up for security and payments
  10. Established entities and new players A lot of half baked solutions There will be C-Level impacts Do not take security lightly. Really understand vendor selection criteria Mission critical – breaches cause job lose and brand lose
  11. Summarize… Point out next in series of Webinars Tokenization best practices – specific technologies best practices But first understand your dirvers and workflows and where to begin.