SlideShare una empresa de Scribd logo
1 de 43
Hacking Point of Sale:
How Everyone Can Learn from the Compromise of Mega Retailers
WITH SLAVA GOMZIN, SECURITYAND PAYMENTS TECH., HP
AND KEN WESTIN, PRODUCT MARKETING MANAGER, TRIPWIRE
How Everyone Can Learn from the Compromise of Mega Retailers
Slava Gomzin, CISSP. PCIP, ECSP, Security+
Security and Payments Technologist, HP
 What’s happened at Target
 How PCI failed to protect them
 What can be done to avoid the breach
 Q&A
Network IDS/IPS (Intrusion
Detection/Prevention System)?
Antivirus?
Security/IT personnel?
Credit Card Security Pattern
Recognition System?
FBI cyber crime division?
Payment Processor?
File Integrity Monitor?
Brian Krebs
Journalist, blogger,
KrebsOnSecurity.com
40 million – The number of credit and
debit cards thieves stole from Target
between Nov. 27 and Dec. 15, 2013.
70 million – The number of records
stolen that included the name, address,
email address and phone number of
Target shoppers.
46 – The percentage drop in profits at
Target in the fourth quarter of 2013,
compared with the year before.
200 million – Estimated dollar cost to
credit unions and community banks
for reissuing 21.8 million cards — about
half of the total stolen in the Target
breach.
100 million – The number of dollars
Target says it will spend upgrading their
payment terminals to support Chip-and-
PIN enabled cards.
The attackers were able to infect Target’s point-of-sale registers with a
malware strain that stole credit and debit card data. The intruders also set up a
control server within Target’s internal network that served as a central
repository for data hovered up from all of the infected registers.
POS/PA must “touch” the memory and the hard drive of hosting POS machine
in order to process transaction data
POS must communicate with outside world to get authorizations
and process settlements
PCI DSS
PCI Data Security
Standard
PTS
PIN Data Security
PCI P2PE
PCI Point-to-Point
Encryption
PA-DSS
Payment Application
Data Security
Standard
1
1.1
1.2 1.2.1
2.0
3
2005 2006 2007 2008 2009 2010 2011 2012 2013
0
10
20
30
40
50
60
70
80
90
2005 2006 2007 2008 2009 2010 2011 2012
Source: Privacy Rights Clearinghouse
 There is no reliable software technology today that would easily
resolve Memory Scraping problem without investing in new systems
which introduce new protection methods such as encrypting the data
end to end. Therefore, payment software vendors are currently not
obligated by PCI standards to protect the memory of their
applications.
 Instead, the merchants—users of the software—are obligated to protect
the memory of their computers running such applications by
implementing different types of compensating mechanisms, such as
physical and network controls listed in PCI DSS requirements.
Server
HSM
POS/Payment
application
PED/MSR with
TRSM
Internet
Server Database
LMK
BDK
IPEK
SSL
SSL
By the end of 2015, 70% of U.S. credit cards and 41% of U.S. debit cards will be EMV enabled -
according to Aite Group report
 PCI Audit Relief
 PCI audit relief is applicable if 75 percent or more of the merchant transactions are captured at
hybrid EMV terminals (supporting both contact and contactless interfaces). Even if the majority
of transactions are from magnetic stripe-only cards, if they are performed at hybrid EMV
terminals the relief is applicable
 PCI Audit Relief Dates:
 Visa, Amex: October 2013
 MC: October 2012
 Liability Shift
 The party, either the issuer or merchant, who does not support EMV, assumes liability for
counterfeit card transactions.
 Liability Shift Dates:
 Visa, MC, Amex, Discover: October 2015
 October 2017 – for automated fuel dispensers (gas stations)
 EMV does not provide security for online transactions
 EMV card number should be keyed for Internet purchase
 EMV does not require data encryption
 Data is still transferred in clear text between POS and Payment Processor
 P2PE is still recommended to protect the data
 EMV cards still have mag stripe for fallback processing
 Card data can be stolen
 EMV vulnerabilities will be exploited once US adopts EMV Cards
 Currently, there is no need to hack EMV because there is mag stripe in the US
 There are EMV Contactless vulnerabilities already demonstrated on security conferences
LOG
INTELLIGENCE
SECURITY
CONFIGURATION
MANAGEMENT
VULNERABILITY
MANAGEMENT
Unified
Security
Intelligence
VULNERABILITY DATA
HOSTS & SERVER
DATABASE ACTIVITY
USER ACTIVITY
CONFIGURATION DATA
SECURITY DEVICES
(IDS – FIREWALLS)
ACTIVE DIRECTORY
APP ACTIVITY
PHYSICAL ACCESS
ACTIONABLE INTELLIGENCE
ANALYTICS, FORENSICS & COMPLIANCE
Breach caught before exfiltration
of any credit card data!



Más contenido relacionado

La actualidad más candente

Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Netcetera
 
The Future of Payments
The Future of PaymentsThe Future of Payments
The Future of PaymentsNetcetera
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-securityKerri Lorch
 
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, NetceteraBoost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, NetceteraNetcetera
 
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORMNetcetera
 
3-D Secure 2.0
3-D Secure 2.03-D Secure 2.0
3-D Secure 2.0Netcetera
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
Multiple tokenization schemes meet the merchant
Multiple tokenization schemes meet the merchantMultiple tokenization schemes meet the merchant
Multiple tokenization schemes meet the merchantUlf Mattsson
 
Seamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceSeamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceNetcetera
 
figo at API Days 2016 in Paris
figo at API Days 2016 in Parisfigo at API Days 2016 in Paris
figo at API Days 2016 in ParisLars Markull
 
So you want to be an EMV Issuer...
So you want to be an EMV Issuer...So you want to be an EMV Issuer...
So you want to be an EMV Issuer...Ainsley Ward
 
apidays LIVE LONDON - Open Banking from incumbent bank point of view - succes...
apidays LIVE LONDON - Open Banking from incumbent bank point of view - succes...apidays LIVE LONDON - Open Banking from incumbent bank point of view - succes...
apidays LIVE LONDON - Open Banking from incumbent bank point of view - succes...apidays
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - finalAlex Tan
 
Secure payments slick
Secure payments slick Secure payments slick
Secure payments slick gensoftpro
 
Mark Buitenhek, 5th Digital Banking Forum
Mark Buitenhek, 5th Digital Banking ForumMark Buitenhek, 5th Digital Banking Forum
Mark Buitenhek, 5th Digital Banking ForumStarttech Ventures
 
Thoughts on the Future of Payments
Thoughts on the Future of PaymentsThoughts on the Future of Payments
Thoughts on the Future of PaymentsAinsley Ward
 
Contactless Payment Pp
Contactless Payment PpContactless Payment Pp
Contactless Payment Ppcolleneakard
 

La actualidad más candente (20)

Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...
 
The Future of Payments
The Future of PaymentsThe Future of Payments
The Future of Payments
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-security
 
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, NetceteraBoost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
 
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
 
Requirement of PCI DSS in India.
Requirement of PCI DSS in India.Requirement of PCI DSS in India.
Requirement of PCI DSS in India.
 
3-D Secure 2.0
3-D Secure 2.03-D Secure 2.0
3-D Secure 2.0
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Payment Card Industry Adjudication Process
Payment Card Industry Adjudication ProcessPayment Card Industry Adjudication Process
Payment Card Industry Adjudication Process
 
Multiple tokenization schemes meet the merchant
Multiple tokenization schemes meet the merchantMultiple tokenization schemes meet the merchant
Multiple tokenization schemes meet the merchant
 
Seamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceSeamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experience
 
figo at API Days 2016 in Paris
figo at API Days 2016 in Parisfigo at API Days 2016 in Paris
figo at API Days 2016 in Paris
 
So you want to be an EMV Issuer...
So you want to be an EMV Issuer...So you want to be an EMV Issuer...
So you want to be an EMV Issuer...
 
apidays LIVE LONDON - Open Banking from incumbent bank point of view - succes...
apidays LIVE LONDON - Open Banking from incumbent bank point of view - succes...apidays LIVE LONDON - Open Banking from incumbent bank point of view - succes...
apidays LIVE LONDON - Open Banking from incumbent bank point of view - succes...
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - final
 
Secure payments slick
Secure payments slick Secure payments slick
Secure payments slick
 
Mark Buitenhek, 5th Digital Banking Forum
Mark Buitenhek, 5th Digital Banking ForumMark Buitenhek, 5th Digital Banking Forum
Mark Buitenhek, 5th Digital Banking Forum
 
Thoughts on the Future of Payments
Thoughts on the Future of PaymentsThoughts on the Future of Payments
Thoughts on the Future of Payments
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Contactless Payment Pp
Contactless Payment PpContactless Payment Pp
Contactless Payment Pp
 

Destacado

PCI-DSS Security Awareness
PCI-DSS Security AwarenessPCI-DSS Security Awareness
PCI-DSS Security AwarenessElsye Sutanawi
 
Credit fraud prevention on hwx stack
Credit fraud prevention on hwx stackCredit fraud prevention on hwx stack
Credit fraud prevention on hwx stackKirk Haslbeck
 
Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!Halo Metrics
 
Cashier's pci security training
Cashier's pci security trainingCashier's pci security training
Cashier's pci security trainingAlredic
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
Eight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and TrajectoryEight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and TrajectoryTransUnion
 
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden WilliamsNTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden WilliamsNorth Texas Chapter of the ISSA
 
Protect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security BreachesProtect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security BreachesVerifone
 
7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / WebinarIngenico Group
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...Ingenico Group
 
Robert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_finalRobert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_finalJim Lewis
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksRadware
 

Destacado (16)

PCI-DSS Security Awareness
PCI-DSS Security AwarenessPCI-DSS Security Awareness
PCI-DSS Security Awareness
 
Credit fraud prevention on hwx stack
Credit fraud prevention on hwx stackCredit fraud prevention on hwx stack
Credit fraud prevention on hwx stack
 
Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!
 
Cashier's pci security training
Cashier's pci security trainingCashier's pci security training
Cashier's pci security training
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
Eight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and TrajectoryEight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and Trajectory
 
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden WilliamsNTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
 
Protect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security BreachesProtect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security Breaches
 
7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar
 
2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
 
OTI Cyber warefare
OTI Cyber warefareOTI Cyber warefare
OTI Cyber warefare
 
Robert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_finalRobert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_final
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-Attacks
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
 

Similar a Hacking Point of Sale

EMV - Is your business ready?
EMV - Is your business ready?EMV - Is your business ready?
EMV - Is your business ready?Shannon Walcott
 
Demystifying Attacks on Point of Sales Systems
Demystifying Attacks on Point of Sales SystemsDemystifying Attacks on Point of Sales Systems
Demystifying Attacks on Point of Sales SystemsSymantec
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process- Mark - Fullbright
 
Point sale-pos-systems-security-35357
Point sale-pos-systems-security-35357Point sale-pos-systems-security-35357
Point sale-pos-systems-security-35357prestamonster
 
Attacks on Point of Sale systems - By Symantec
Attacks on Point of Sale systems - By SymantecAttacks on Point of Sale systems - By Symantec
Attacks on Point of Sale systems - By SymantecCheapSSLsecurity
 
Attacks on Point-of-Sales Systems | RapidSSLonline
Attacks on Point-of-Sales Systems | RapidSSLonlineAttacks on Point-of-Sales Systems | RapidSSLonline
Attacks on Point-of-Sales Systems | RapidSSLonlineRapidSSLOnline.com
 
Tokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data StorageTokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data Storage- Mark - Fullbright
 
FreedomPay_Whitepaper_Solutions_For_Hospitality
FreedomPay_Whitepaper_Solutions_For_HospitalityFreedomPay_Whitepaper_Solutions_For_Hospitality
FreedomPay_Whitepaper_Solutions_For_HospitalityJeff Vogel
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCIKelly Lam
 
Out of Scope Whitepaper
Out of Scope WhitepaperOut of Scope Whitepaper
Out of Scope WhitepaperMark Moreno
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheyPeter Tran
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011jhatch9418
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersEckoh
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 

Similar a Hacking Point of Sale (20)

EMV - Is your business ready?
EMV - Is your business ready?EMV - Is your business ready?
EMV - Is your business ready?
 
Demystifying Attacks on Point of Sales Systems
Demystifying Attacks on Point of Sales SystemsDemystifying Attacks on Point of Sales Systems
Demystifying Attacks on Point of Sales Systems
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process
 
Point sale-pos-systems-security-35357
Point sale-pos-systems-security-35357Point sale-pos-systems-security-35357
Point sale-pos-systems-security-35357
 
Attacks on Point of Sale systems - By Symantec
Attacks on Point of Sale systems - By SymantecAttacks on Point of Sale systems - By Symantec
Attacks on Point of Sale systems - By Symantec
 
Attacks on Point-of-Sales Systems | RapidSSLonline
Attacks on Point-of-Sales Systems | RapidSSLonlineAttacks on Point-of-Sales Systems | RapidSSLonline
Attacks on Point-of-Sales Systems | RapidSSLonline
 
MTBiz May-June 2019
MTBiz May-June 2019 MTBiz May-June 2019
MTBiz May-June 2019
 
Tokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data StorageTokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data Storage
 
FreedomPay_Whitepaper_Solutions_For_Hospitality
FreedomPay_Whitepaper_Solutions_For_HospitalityFreedomPay_Whitepaper_Solutions_For_Hospitality
FreedomPay_Whitepaper_Solutions_For_Hospitality
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCI
 
Out of Scope Whitepaper
Out of Scope WhitepaperOut of Scope Whitepaper
Out of Scope Whitepaper
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_Richey
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011
 
Requirement of PCI-DSS in India.
Requirement of PCI-DSS in India.Requirement of PCI-DSS in India.
Requirement of PCI-DSS in India.
 
emv-ebook
emv-ebookemv-ebook
emv-ebook
 
Pcidss qr gv3_1
Pcidss qr gv3_1Pcidss qr gv3_1
Pcidss qr gv3_1
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
Pci ssc quick reference guide
Pci ssc quick reference guidePci ssc quick reference guide
Pci ssc quick reference guide
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 

Más de Tripwire

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughTripwire
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportTripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!Tripwire
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsTripwire
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 

Más de Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 

Último

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Hacking Point of Sale

  • 1. Hacking Point of Sale: How Everyone Can Learn from the Compromise of Mega Retailers WITH SLAVA GOMZIN, SECURITYAND PAYMENTS TECH., HP AND KEN WESTIN, PRODUCT MARKETING MANAGER, TRIPWIRE
  • 2. How Everyone Can Learn from the Compromise of Mega Retailers Slava Gomzin, CISSP. PCIP, ECSP, Security+ Security and Payments Technologist, HP
  • 3.  What’s happened at Target  How PCI failed to protect them  What can be done to avoid the breach  Q&A
  • 4.
  • 5. Network IDS/IPS (Intrusion Detection/Prevention System)? Antivirus? Security/IT personnel? Credit Card Security Pattern Recognition System? FBI cyber crime division? Payment Processor? File Integrity Monitor? Brian Krebs Journalist, blogger, KrebsOnSecurity.com
  • 6. 40 million – The number of credit and debit cards thieves stole from Target between Nov. 27 and Dec. 15, 2013. 70 million – The number of records stolen that included the name, address, email address and phone number of Target shoppers. 46 – The percentage drop in profits at Target in the fourth quarter of 2013, compared with the year before. 200 million – Estimated dollar cost to credit unions and community banks for reissuing 21.8 million cards — about half of the total stolen in the Target breach. 100 million – The number of dollars Target says it will spend upgrading their payment terminals to support Chip-and- PIN enabled cards.
  • 7. The attackers were able to infect Target’s point-of-sale registers with a malware strain that stole credit and debit card data. The intruders also set up a control server within Target’s internal network that served as a central repository for data hovered up from all of the infected registers.
  • 8. POS/PA must “touch” the memory and the hard drive of hosting POS machine in order to process transaction data
  • 9. POS must communicate with outside world to get authorizations and process settlements
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. PCI DSS PCI Data Security Standard PTS PIN Data Security PCI P2PE PCI Point-to-Point Encryption PA-DSS Payment Application Data Security Standard
  • 16.
  • 17. 1 1.1 1.2 1.2.1 2.0 3 2005 2006 2007 2008 2009 2010 2011 2012 2013
  • 18. 0 10 20 30 40 50 60 70 80 90 2005 2006 2007 2008 2009 2010 2011 2012 Source: Privacy Rights Clearinghouse
  • 19.
  • 20.
  • 21.
  • 22.  There is no reliable software technology today that would easily resolve Memory Scraping problem without investing in new systems which introduce new protection methods such as encrypting the data end to end. Therefore, payment software vendors are currently not obligated by PCI standards to protect the memory of their applications.  Instead, the merchants—users of the software—are obligated to protect the memory of their computers running such applications by implementing different types of compensating mechanisms, such as physical and network controls listed in PCI DSS requirements.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30. By the end of 2015, 70% of U.S. credit cards and 41% of U.S. debit cards will be EMV enabled - according to Aite Group report  PCI Audit Relief  PCI audit relief is applicable if 75 percent or more of the merchant transactions are captured at hybrid EMV terminals (supporting both contact and contactless interfaces). Even if the majority of transactions are from magnetic stripe-only cards, if they are performed at hybrid EMV terminals the relief is applicable  PCI Audit Relief Dates:  Visa, Amex: October 2013  MC: October 2012  Liability Shift  The party, either the issuer or merchant, who does not support EMV, assumes liability for counterfeit card transactions.  Liability Shift Dates:  Visa, MC, Amex, Discover: October 2015  October 2017 – for automated fuel dispensers (gas stations)
  • 31.  EMV does not provide security for online transactions  EMV card number should be keyed for Internet purchase  EMV does not require data encryption  Data is still transferred in clear text between POS and Payment Processor  P2PE is still recommended to protect the data  EMV cards still have mag stripe for fallback processing  Card data can be stolen  EMV vulnerabilities will be exploited once US adopts EMV Cards  Currently, there is no need to hack EMV because there is mag stripe in the US  There are EMV Contactless vulnerabilities already demonstrated on security conferences
  • 32.
  • 33.
  • 35. VULNERABILITY DATA HOSTS & SERVER DATABASE ACTIVITY USER ACTIVITY CONFIGURATION DATA SECURITY DEVICES (IDS – FIREWALLS) ACTIVE DIRECTORY APP ACTIVITY PHYSICAL ACCESS ACTIONABLE INTELLIGENCE ANALYTICS, FORENSICS & COMPLIANCE
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. Breach caught before exfiltration of any credit card data!
  • 41.
  • 42.

Notas del editor

  1. WinHex Forensic Utility
  2. WireShark Network Sniffer
  3. Combining log intelligence, vulnerability data and security configuration information, we are then able to answer key security questions important to the business, for true security intelligence. Instead of simply providing reports we are able to answer specific questions with confidence, such as what systems are vulnerable, what systems are being attacked, which have already been compromised, which should we fix first, have we seen this before, when was it in a trusted state.
  4. The basic idea of log intelligence is to make sense of the seemingly disparate events that are happening in your environment. <change slide> Usually this consists of log data from user systems, security devices, applications and other sources <change slide> In addition to this data, Tripwire also brings in additional layers of information including data from our Vulnerability Management solution as well as Security Configuration data. We are able then to correlate events, vulnerabilities and system state which provides higher resolution and business context around what is happening in your environment. <change> Through our powerful integrated correlation engine we provide actionable real-time intelligence which can trigger alerts, or actions such as automated remediation, or work with additional tools such as our certified integration with ArcSight, or a number of our other Technology Alliance Partners and other systems. <change> Tripwire also provides secure archives of this data paired with powerful security analytics and forensics tools for security and compliance.
  5. The fact they did not have the network their vendors had access separated from their POS is troubling. Additionally they should have had logging in place to monitor and keep track of vendor activitiy on their network. With Tripwire Log Center we have rules out of the box that helps organizations monitor user activity closely on the network and correlate events across the network. Tripwire IP360 is our vulnerability management solution that is used by organizations to monitor and track where their systems are weak.
  6. Hypothetical Target Attack – post on our blog in December before the breach was discovered. Important to cathc attackers in the act. When can you catch them and where is your best chance. Recon, enumeration. In this case they found an HVAC vendor with access to target. Small chance to detect at the recon phase. Exploitation and entrechment: 2 weeks they could exfiltrate data, greater and greater chance of catching them Then they will cover their tracksif they are a good attacker
  7. Loaded a piece of malware onto a patch server, distributed to 1,800 stores across north america, 30 POS Malware pulled the credit card data out of memory, but it was updating a file share 40 million credit cards Online Retailer: Plagued by outages on their webservers Security story: SQL injection at department store, batch file. Automated cyber-security intelligence, including: Security gap analysis Proof of compliance Executive reports for risk and compliance trending. Sharing the techniques to: Eliminate security gaps Become compliant Improve risk ratings Automated Remediation: Fix compliance issues with the push of a button Approval workflows Device Support: “You can go big with TW” – think enterprise with us.
  8. 50K devices being changed n black Friday. A lot of file integrity monitoring solutions simply run a scan at a set interval, some even a month apart. Continuous monitoring is critical in retail given the velocity and change Everytime a cards was swiped they could have detected. Configured to no create fileshares the data could not have been exfiltrated. It took 7 days for them to send this infomation, they could have caught it in 6 days and would have avoided the breach. We would have caught it in the first credit card swipe. Online Retailer: Plagued by outages on their webservers Security story: SQL injection at department store, batch file. Automated cyber-security intelligence, including: Security gap analysis Proof of compliance Executive reports for risk and compliance trending. Sharing the techniques to: Eliminate security gaps Become compliant Improve risk ratings Automated Remediation: Fix compliance issues with the push of a button Approval workflows Device Support: “You can go big with TW” – think enterprise with us.
  9. Thank you for your questions Thanks again to Charles Kolodgy from IDC for joining us today and sharing his thoughts on Vulnerability Management, and thanks to all of you for attending. We hope that you found the presentation informative and interesting. Remember to rate and comment on this webcast, in the Ratings section. And be on the lookout for an email from me with the on-demand link to this event. Have a great week!