Sector-focused framework for applying policies, procedures, evidence collection and supporting activities
Our training is developed to meet the specific needs of higher and further education institutions, and builds on over a decade of experience of delivering this type of training
Information Security
Payment Security
The payer (consumer, student or parent)
Expects a good payment experience that is seamless and secure
Expects compliance with legal, regulatory and contractual obligations
Trusts the merchant (institution) with their personal data
Payment card transactions and use of emerging payment solutions increasing
The scammer (hacker, threat actor, fraudster, criminal)
Commits fraud for financial gain
The education sector is an attractive target
Monetise stolen personal and payment card data
Target attacks on e-commerce
Target vulnerabilities on critical infrastructure
Skimming and tampering fraud
Social engineering to steal credentials
The third party
Payment Acceptance
Payment Service Providers
Service Providers
Third Parties
Tenants
All will need to demonstrate compliance with appropriate standards
The acquirer
A financial institution that processes payment cards transactions on behalf of the merchant
A contractual agreement with the merchant to comply with PCI DSS
Non-compliance charges and fines passed to merchants
Charges per MID, per transaction
Accountability for Payment Security (COO, CFO, Director of Finance)
Non compliance letters to accountable owner
Sector viewed as high risk
A breach could impact the ability to take payments
The merchant
Must protect the institution's reputation
Must protect personal data
Must comply with legal, regulatory and contractual obligations
Must be accountable and be able to demonstrate compliance
Sustainability, the need to embed into business-as-usual processes
Maintain the ability to take payments
Avoid fines and reduce risk of financial loss
Payment Security is a cost of doing business
Maintain reputation and credibility
Reduce the risk of a data breach and fines
Meets legal, contractual and regulatory compliance with DPA, GDPR, PCI DSS
Payment Security is a business opportunity
Changes to payment acceptance can improve security
Transform, improve and embed business processes
Reduce your scope to mitigate risk
Reduce the risk of operational downtime
Addresses gaps and inconsistences in PCI DSS
Card Data Environment (CDE)
The systems components, people and processes that store, process or transmit cardholder data or sensitive authentication data
System components that may not store, process or transmit cardholder/SAD data have unrestricted connectivity to system components that do
Payment Security Environment (PSE)
The Payment Security Environment looks to encapsulate all elements of the technology, systems, people and processes which can impact "payment security" in the broadest sense
Encourages and nurtures a security mindset by going beyond a compliance focused approach
Scoping
1. Identify
2. Locate and Document
3. Identify other Systems/processes/personnel
4. Minimise Scope
5. Implement PCI Requirements
6. Maintain/Monitor
Your CDE will need: Multiple Locations
Various Staff (And 24/7)
Variety of Customers And their differing demands
Use Multiple Technologies
Be Managed by Multiple Teams/Depts
Online, F2F, Moto, Vending
Your CDE will need: Managed & Maintained Contracts
A Virtual Vault Of all evidence
Training Courses For every group of CDE staff
Archive of Previous Evidence Management & Maintenance of Records Of everything to do with CDE
Governance of Policies
Your CDE may be directly or indirectly supported by: Network & Communication Services
IT Services
Acquirers, Payment Service Providers
Estates & Utility Services / Access Controls
Contractors & Suppliers
Your CDE may be impacted by: People
Physical location
Institution's activities
Policies, legislation, contracts etc.
Restructure
Third parties operating on campus
In-house or third party technical failures
Security incident or breach
People in the CDE
Working in the CDE
Impacting the CDE
Supporting the CDE
"Ensure that security policies & operational procedures for... Are documented, in use & known to all affected parties."
Cardholder Data & Sensitive Authentication Data: The PAN is the defining CHD factor
CHD is allowed to be stored, but PAN must be rendered unreadable
SAD should never be stored after authorisation
Anywhere that CHD is stored, processed or transmitted needs to be PCI compliant
Cardholder Data
Primary Account Number (PAN)
Cardholder Name
Expiry Date
Service Code
Documenting cardholder data flows using a dataflow diagram assists in identifying the locations of all CHD that transmitted within the network
Information Security
Confidentiality - Assigning permissions to sensitive data using a principle of least privileges necessary and preventing any unauthorised access
Integrity - Ensuring that data is up to date, accurate and reliable
Availability - Ensuring that data is accessible when required
British Airways: 500,000 data subjects, £183m fine from ICO, Vulnerability exploited in out of date software
Student jailed for using a keylogger to up his exam marks, Sentenced to 4 months in prison
3 Universities IT systems attacked, "We just don't know" when disruption caused by a "major cyber-attack" will be fixed, Ransomware attack, IT systems still disabled a week after being hit, Reputational damage
GDPR at a glance: Data Controllers must report the breach (even whilst still investigating) to the ICO within 72 hours of becoming aware
Individuals have right to move, copy of transfer data
There are two tiers of fines: Administrative: €10 million/2% turnover, Principle failing: €20 million/4% turnover
Consent to processing is no longer allowed to be assumed. Affirmative action required
Applies to your organisation and any other business you partner with to process data on your behalf
Refocuses and expands on the rights an individual has and what they must be provided
Privacy must be built in and considered throughout the lifecycle of the data
Your organisation must appoint a data protection officer to monitor, inform & advise
The 7 Principles of GDPR: Lawfulness, fairness & transparency
Purpose Limitation
Data Minimisation
Accuracy
Storage Limitation
Security
Accountability
PCI DSS
Minimum Controls
Global Standard
Assumptions
Prescriptive
Security
Keeping the safe locked 24/7
Something we do every day
Customer Expectation
Business Expectation
Acquirer Expectation
Compliance
Reporting the safe was locked on the day we checked it
A point in time view
PCI DSS v4 – what is it and goals?
GDPR Principles
Lawfulness, fairness & transparency
Purpose Limitation
Data Minimisation
Accuracy
Storage Limitation
Security
Accountability
GDPR "Security" Principle
Keeping the safe locked 24/7
Payment Security Standards
Cyber Security Frameworks and Infosec Standards
PCI DSS
Minimum Controls
Global Standard
Assumptions
Prescriptive
Security
Keeping the safe locked 24/7
Something we do every day
Customer Expectation
Business Expectation
Acquirer Expectation
Compliance
Reporting the safe was locked on the day we checked it
A point in time view
How do you think a significant data breach would impact your institution?
Consequences of non-compliance/breach
PCI DSS: Fines from card schemes, Higher acquiring fees, Forensic Investigation, Replacement cards, Cover fraudulent spend, Non-compliance could lead to a data breach
GDPR: Fines from regulating bodies (ICO in the UK) up to £20 Million or 4% of annual turnover, whichever is higher, Reputational damage, Operational downtime, Loss of assets (sensitive data), Financial loss, Further legal action
Average cost of a Data Breach (IBM 2022): Global Average cost of a data breach ($4.35m), £3.8M; Global Average cost per lost record ($164), £143; Average cost of data breach in UK ($5.05M), £4.4M; 277 Average time to contain a data breach days