SlideShare une entreprise Scribd logo
1  sur  9
5 MYTHS ABOUT
    PCI DSS
  COMPLIANCE
   PROGRAMS
Top Patch delivers information
                                  security products that reduce risk,
                                  increase data security and ensure
                                  compliance.

                                  • Remediation Vault™: first peer-to-
                                    peer patch distribution product.
                                  • Vulnerabilities patched before
                                    hackers can exploit them.
                                  • Unix, Linux, BSD, OSX and
                                    Windows OS protected with
                                    newest security patches.
                                              www.toppatch.com
                                   Email: alex@toppatch.com • Twitter: @toppatch
©TopPatch • All Rights Reserved     349 Fifth Avenue, New York NY 10016, (646)
5 Myths About
                        PCI DSS Compliance Programs



PCI DSS Compliance Programs:
Store, transmit, process credit card information
securely

    • Payment brands and acquirers responsible to
    enforce compliance.

    • There are 12 requirements involving business
    processes and technologies to secure consumer
    information.
5 Myths About
                        PCI DSS Compliance Programs



• Myth #1: “Single product and vendor are
sufficient”

    • No single vendor can address the 12 PCI DSS
    requirements.

    • Beware of single product/single vendor
    approaches.

    • Implement holistic strategy, focus on bigger
    picture.
5 Myths About
                       PCI DSS Compliance Programs



• Myth #2: “We are a small merchant, we are
exempt”

  • PCI applies to all merchants and organizations
  accepting cardholder data.

  • Even if you process a handful of transactions.
5 Myths About
                       PCI DSS Compliance Programs



• Myth #3: “We are compliant because we
outsource credit card processing”

  • Outsourcing simplifies payment card
  processing.

  • It does not result in automatic compliance.

  • Make sure provider’s terminals and applications
  comply with PCI standards and don’t store
  sensitive cardholder data.

  • Request a certificate of compliance.
5 Myths About
                        PCI DSS Compliance Programs



• Myth #4: “PCI will make us completely
secure”


 • PCI does not translate into permanent
security.


   • Security exploits continue.
5 Myths About
                        PCI DSS Compliance Programs



• Myth #5: “We need to hire a Qualified
Security Assessor (“QSA) in order to meet PCI
requirements”.


   • PCI does not mandate hiring a QSA.

    • Hiring a QSA provides an officer sign-off if
    acquirer or merchant bank agrees.

    • Smaller business may assess their
    business using the Self-Assessment
    Questionnaire found on the PCI web site.

    • PCI DSS Compliance requires merchants to
    have a quarterly vulnerability scan by a PCI
    SSC Approved Scanning Vendor (ASV).
Top Patch delivers
     information security
  products that reduce risk,
  increase data security and
      ensure compliance

     Request a free trial of
     the Remediation Vault
              for
      Best-In-Class Patch
          Management
Alex
Email: alex@toppatch.com
(646) 664-4265
349 Fifth Avenue, New York, NY 10016
www.toppatch.com
Twitter: @toppatch

Contenu connexe

En vedette

[Austria] Security by Design
[Austria] Security by Design[Austria] Security by Design
[Austria] Security by DesignOWASP EEE
 
Precision Corporate Profile_Rev_09
Precision Corporate Profile_Rev_09Precision Corporate Profile_Rev_09
Precision Corporate Profile_Rev_09Prem Kumar
 
Website_Pentest_Samplet_Report_Brisk_Infosec_Solutions
Website_Pentest_Samplet_Report_Brisk_Infosec_SolutionsWebsite_Pentest_Samplet_Report_Brisk_Infosec_Solutions
Website_Pentest_Samplet_Report_Brisk_Infosec_SolutionsBriskInfosec Solutions
 
Responsive Web Design in Cascade Server, by Chris Cox of BarkleyREI
Responsive Web Design in Cascade Server, by Chris Cox of BarkleyREIResponsive Web Design in Cascade Server, by Chris Cox of BarkleyREI
Responsive Web Design in Cascade Server, by Chris Cox of BarkleyREIhannonhill
 
Wallet procedures english
Wallet procedures englishWallet procedures english
Wallet procedures englishmonique757782
 
When dynamic becomes static - the next step in web caching techniques
When dynamic becomes static - the next step in web caching techniquesWhen dynamic becomes static - the next step in web caching techniques
When dynamic becomes static - the next step in web caching techniquesWim Godden
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessmentRavikumar Paghdal
 
Managing Data Center Connectivity TechBook
Managing Data Center Connectivity TechBook Managing Data Center Connectivity TechBook
Managing Data Center Connectivity TechBook EMC
 
Workshop Iptables e Squid On Line
Workshop Iptables e Squid On LineWorkshop Iptables e Squid On Line
Workshop Iptables e Squid On LineLinux Solutions
 
Network Security
Network SecurityNetwork Security
Network Securityphanleson
 
A new web application vulnerability assessment framework
A new web application vulnerability assessment frameworkA new web application vulnerability assessment framework
A new web application vulnerability assessment frameworkMark Jayson Fuentes
 
IPv6 deployment status
IPv6 deployment statusIPv6 deployment status
IPv6 deployment statusAPNIC
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...Michigan Primary Care Association
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Kyle Lai
 

En vedette (19)

Brisk WebApp penetration tester
Brisk WebApp penetration testerBrisk WebApp penetration tester
Brisk WebApp penetration tester
 
[Austria] Security by Design
[Austria] Security by Design[Austria] Security by Design
[Austria] Security by Design
 
Precision Corporate Profile_Rev_09
Precision Corporate Profile_Rev_09Precision Corporate Profile_Rev_09
Precision Corporate Profile_Rev_09
 
Website_Pentest_Samplet_Report_Brisk_Infosec_Solutions
Website_Pentest_Samplet_Report_Brisk_Infosec_SolutionsWebsite_Pentest_Samplet_Report_Brisk_Infosec_Solutions
Website_Pentest_Samplet_Report_Brisk_Infosec_Solutions
 
Responsive Web Design in Cascade Server, by Chris Cox of BarkleyREI
Responsive Web Design in Cascade Server, by Chris Cox of BarkleyREIResponsive Web Design in Cascade Server, by Chris Cox of BarkleyREI
Responsive Web Design in Cascade Server, by Chris Cox of BarkleyREI
 
Wallet procedures english
Wallet procedures englishWallet procedures english
Wallet procedures english
 
Step by step guide for web application security testing
Step by step guide for web application security testingStep by step guide for web application security testing
Step by step guide for web application security testing
 
When dynamic becomes static - the next step in web caching techniques
When dynamic becomes static - the next step in web caching techniquesWhen dynamic becomes static - the next step in web caching techniques
When dynamic becomes static - the next step in web caching techniques
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessment
 
AppIT
AppITAppIT
AppIT
 
Managing Data Center Connectivity TechBook
Managing Data Center Connectivity TechBook Managing Data Center Connectivity TechBook
Managing Data Center Connectivity TechBook
 
Firewall
FirewallFirewall
Firewall
 
Workshop Iptables e Squid On Line
Workshop Iptables e Squid On LineWorkshop Iptables e Squid On Line
Workshop Iptables e Squid On Line
 
Network Security
Network SecurityNetwork Security
Network Security
 
A new web application vulnerability assessment framework
A new web application vulnerability assessment frameworkA new web application vulnerability assessment framework
A new web application vulnerability assessment framework
 
IPv6 deployment status
IPv6 deployment statusIPv6 deployment status
IPv6 deployment status
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
 

Dernier

Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 

Dernier (20)

No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 

5 Myths About PCI DSS Compliance Programs

  • 1. 5 MYTHS ABOUT PCI DSS COMPLIANCE PROGRAMS
  • 2. Top Patch delivers information security products that reduce risk, increase data security and ensure compliance. • Remediation Vault™: first peer-to- peer patch distribution product. • Vulnerabilities patched before hackers can exploit them. • Unix, Linux, BSD, OSX and Windows OS protected with newest security patches. www.toppatch.com Email: alex@toppatch.com • Twitter: @toppatch ©TopPatch • All Rights Reserved 349 Fifth Avenue, New York NY 10016, (646)
  • 3. 5 Myths About PCI DSS Compliance Programs PCI DSS Compliance Programs: Store, transmit, process credit card information securely • Payment brands and acquirers responsible to enforce compliance. • There are 12 requirements involving business processes and technologies to secure consumer information.
  • 4. 5 Myths About PCI DSS Compliance Programs • Myth #1: “Single product and vendor are sufficient” • No single vendor can address the 12 PCI DSS requirements. • Beware of single product/single vendor approaches. • Implement holistic strategy, focus on bigger picture.
  • 5. 5 Myths About PCI DSS Compliance Programs • Myth #2: “We are a small merchant, we are exempt” • PCI applies to all merchants and organizations accepting cardholder data. • Even if you process a handful of transactions.
  • 6. 5 Myths About PCI DSS Compliance Programs • Myth #3: “We are compliant because we outsource credit card processing” • Outsourcing simplifies payment card processing. • It does not result in automatic compliance. • Make sure provider’s terminals and applications comply with PCI standards and don’t store sensitive cardholder data. • Request a certificate of compliance.
  • 7. 5 Myths About PCI DSS Compliance Programs • Myth #4: “PCI will make us completely secure” • PCI does not translate into permanent security. • Security exploits continue.
  • 8. 5 Myths About PCI DSS Compliance Programs • Myth #5: “We need to hire a Qualified Security Assessor (“QSA) in order to meet PCI requirements”. • PCI does not mandate hiring a QSA. • Hiring a QSA provides an officer sign-off if acquirer or merchant bank agrees. • Smaller business may assess their business using the Self-Assessment Questionnaire found on the PCI web site. • PCI DSS Compliance requires merchants to have a quarterly vulnerability scan by a PCI SSC Approved Scanning Vendor (ASV).
  • 9. Top Patch delivers information security products that reduce risk, increase data security and ensure compliance Request a free trial of the Remediation Vault for Best-In-Class Patch Management Alex Email: alex@toppatch.com (646) 664-4265 349 Fifth Avenue, New York, NY 10016 www.toppatch.com Twitter: @toppatch

Notes de l'éditeur

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n