There's a lot of things that we've
had to address over the last six months
when this COVID-19 became a pandemic.
And it was a result
of all this good work as a community
that we were able to
quickly turn around and and provide
guidance back to
the rest of people searching for answers.
Welcome to Focus! A podcast dedicated to
the business of higher education.
I'm your host Heather Richmond and we
will be exploring the challenges
and opportunities facing today's higher
learning institutions.
Today I'm interviewing with Troy Leach
senior vice president
and engagement officer at PCI Security
Standards Council.
He provides insights about the new
strategic framework that has been put
into place for PCI.
Hi Troy. Thanks for being our guest today.
Thanks for having me, Heather.
Well for those who may not be familiar
with the PCI Security Standards Council,
can you provide a little background?
Sure, happy to. The PCI Council is a
global forum
that brings together payment industry
stakeholders to develop
different types of data security
standards, and then also
drive adoption of those standards in
industry,
along with raising awareness of other
resources we have for protecting
payments worldwide.
The council was founded in 2006 by
American Express,
Discover, JCB International, Mastercard,
and Visa. And we have the founding members,
all five of them, share equally in the
governance of the organization,
with of course the support of more than
800 companies worldwide that
help participate in making payments
safer.
That is great, and actually we did this
podcast
once before. We actually recorded
an episode for season one because that's
when the new strategic framework was
released,
but then that COVID thing happened and
some of these things that make sense
anymore.
It is shocking how different who it
is today
compared to what it was just the
last time we recorded.
Yeah, so many of the things that we
were discussing, they were
no longer relevant. We were talking
about types of travel,
and going to Barcelona, and doing
on-site assessments and some of the
challenges there, and and now we
seem to be operating in a brave new
world.
I know my poor suitcase is just sitting
there looking at me like, "I haven't used
you forever!"
And I know that as part of creating that
new strategic framework, your role
changed during that time, right?
It did, yes. So my new title
is senior vice president over market
intelligence
and stakeholder engagement. And what we
did is
we reorganized internally, near the time
of the public release of the framework.
And what this allowed is it provided a
more formal way for us to take action by
having a life cycle for that stakeholder
engagement. I mentioned the 800
participating organizations, hundreds
of other security companies and
professionals around the world,
and then also just the other
stakeholders in industry that
are either applying the PCI standards, or
are looking to them
as an example for what they might be
trying to do as well.
And so that life cycle then provides a
way for us to have a better mechanism to
listen to industry feedback, to encourage
involvement in the standards process,
in the development of future standards,
have us be able to effectively
communicate
some of those changes back out to
industry, and then just raise awareness
through
training and other interaction.
Yeah, that's great. It's really formed into
quite the community, hasn't it?
It really has.
Yeah, well but since the
framework
is still fairly new to the rest of us,
can you provide an
overview of what that framework is?
Yes.
So the framework
essentially captures our
long-standing mission.
And just does a good job of being
able to compartmentalize
all of the strategy that we try to -
and have been trying to - accomplish for
the last 14 years.
Which is to enhance the global payment
account data security and associated
payment data security,
drive education and awareness, and
also the effective implementation of
this by stakeholders. So there
are four pillars. The first is around
increasing industry participation, and
involvement, and development of our
standards and programs,
as well as just broad awareness and
knowledge
of what the intent behind those
standards are.
The second is to continue to evolve the
existing security requirements that have
been created,
and make sure that both the
programs that support those standards,
and the standard requirement
themselves have a legitimacy to them.
That they're still relevant that it
still addresses the emerging threats
of the payment ecosystem. And then also
to
secure - the third pillars - to secure
emerging payment
channels. So looking at how are the new
alternative ways that we're starting to
accept payments,
and are we using mechanisms that are
secure. Are we applying good security
design to these new
payment acceptance methods? But also are
there new security process - new security
methodologies -
that we should be adopting within our
standards and programs, as well.
And then finally, the last pillar is
that we increase
the standards alignment throughout the
world.
And that there's a consistency where
appropriate for us to
partner with other standards bodies,
with other organizations,
around the world to make payments again
safer.
That's great. It is nice to have that
framework so we can all kind of wrap our
head around
the different pillars. So let's dive into
those pillars.
Let's start with pillar one, which again
focuses on the communication and
education.
Yes and this is one of the most
important aspects
where we need involvement from
the community. You know, Benjamin Franklin
once was quoted as saying,
"Tell me and I will forget, you teach me
and I will remember, involve me
and I will learn." And we need that
involvement.
All the work that we're doing from the
request for comment periods,
to engaging at our community meetings
that are happening now
throughout the fall. And then from there,
we
look at how can we create awareness for the
the learnings and the teachings
all over the world. Earlier this year we
had our Latin America forum event
and they were doing case studies. They
did five case studies
that were specific and unique to the
Brazilian market.
But what we noticed is the things that
were happening there
were also happening in Mexico, in
Colombia,
in Europe, Asia, and North America. And so
so it's taking these lessons learned and
being able to work as a global community
to have
some output and be able to adjust.
Because what
impacts us to say in North America
sometimes leads to new types of
vulnerabilities and new exposures
elsewhere and vice versa. So we
need to have a community of payment
security.
And that's really where you saw recently
we've posted a lot
on our website related to COVID-19 and
all of that came
from all of our community coming
together and saying, "These are issues
that we're facing." We had
grocer associations and retailers saying,
"How do we go about continuing to protect
the payment terminals, but
it's a high frequency high traffic area
and we want to make sure that our
customers and our
employees are still safe?" "How do we do
remote assessment?
If, you know, we no longer can travel
abroad
and do these type of evaluations?" "And
how do we work with our suppliers
that might be
in Southeast Asia and we're in North
America?" "How do we deal with the
disruptions to
getting payment technology to us?" There's
a lot of things that that we've
had to address over the last six months
when this
COVID-19 became a pandemic, and it was a
result of
all this good work as a community that
we were able to quickly turn around
and provide guidance back to the
rest of the people searching for answers.
Yeah, you've done a really great job. I
know that I think about that, and see
some of these unique ways when I go to
a restaurant or a retailer and see how
they're handling those point
of sale payments a little bit
differently. And so I know that that guidence
certainly helped. Well speaking of COVID,
with a lot of remote working and some
businesses that really had to shut down
for a while,
risk obviously have gone way up. And
there's really that need to manage risk,
which is pillar two.
So that's really crucial right now. So
let's first talk about those risks that
you see.
Yeah and, you know, we talked
earlier there's a lot of alternative
ways of
accepting payments. And we saw especially
in the small merchant community and
many universities and campuses really
are
small communities. They're almost
their own towns. And they have
all these smaller merchants that are
accepting payments. And a lot of them
had to move quickly to maybe an online
presence that they
didn't have before. Maybe they had a
store that was just
card present transactions they had to
migrate to
e-commerce, or if they were a restaurant,
possibly, they were doing takeout and all
of a sudden were using curbside
payment acceptance equipment, versus what
they were traditionally used to.
So we put together what we identified as
the top
eight really critical
controls that people in a small business
should be thinking about.
We published that on our website and this
is a simple tasks that
should immediately improve security. one
of the things that
COVID-19 really brought to the forefront
is, it's not just the organization
themselves and how they address
and manage the COVID-19, but all of their
third-party suppliers.
We have so many small businesses that
rely on
the the the technology support
of third parties, and sometimes if
technology breaks down,
they were expecting you know their
terminal vendor, or whoever was
supporting maybe
their software, might be on site with
them to
resolve the issue. And we saw that even
those technology vendors were limiting
their
exposure and travel. So we had to find
ways that
remote access into the environment not
only was secured
during that connection but, also remained
secure.
Because we we know that historically
we've had
so many - the majority of data breaches - are
through
exposures and remote access. So
trying to make sure that
all of these new connections also
remain
secure. Yeah, you're absolutely right. All
the stories you do see and it's always
one of those things you're like, "Oh I
didn't realize that that was connected
there, or I left that piece open, or having
that level of vulnerability."
Absolutely. And so this, also in this
pillar number two, this is also where PCI
DSS 4.0 fits in.
It does. And so DSS 4.0
truly is a new generation, a new revision
of the standard.
And probably the single biggest change
is with our new customized approach
option. So the PCI draft - and I have to
emphasize it's
currently in draft - it does include a new
approach to meeting
and validating different security
technologies
and methodologies to meet the objectives
of PCI
DSS requirements.
You can think of this as a new and
better way of
developing, and then documenting
compensated control.
Something that I think over the years
really people shied away from because
there wasn't as much
clarity to the intent. And the the new
approach we're hoping
provides a roadmap for what it looks
like if you have a mature
risk organization that has the right
mechanisms and mature process in place.
How you could go about doing and
demonstrating
good efficacy and security. So
we received a lot of guidance on this
new approach.
In fact, our RFC process netted over
3,200 pieces of comments. And
we just introduced this here a new RFC
process
that actually requires us to document
and show back to any submitter
what we did with those comments. And so
you imagine that was
quite a daunting task over the last
six to eight months.
And now we're in the process - we're
in the middle of -
a request for comment period to look to
see, did we get those comments right? This
will be the third -
and hopefully final - request for comment
period. So if any of the listeners
are a participating organization, many
universities are,
I highly encourage them to consider
looking at the draft,
downloading it, and knowing that it
could change.
It has evolved quite a bit, actually, in
the last six months. And things
that we've proposed in
the first RFC were not there in the
second,
and probably will change and evolve
again in the
third RFC. But we highly encourage
people if they do want to be involved,
this is the time now
to act and have that chance to
see what we're thinking about. That's
great. I know that we were
one of those 3,200 submitting some
comments. So, appreciate all the work you
guys have put into
really taking good consideration for
all of those
comments, and then also giving that
feedback loop back to the community.
It's been really interesting, Heather you
know, we've covered off
so many different topics, and I'm not
calling out any requirements because I
don't know what your requirements that
you commented are,
but I do know there are some
general themes that
did come to light. One of that was
around
just the protection of cardholder
data and transmission, so requirement
four of the PCI DSS.
And looking at have have we evolved
to a place that,
you know, there's so many entities
involved and
inside of our networks. Do we need to be
looking at a broader encryption
requirement?
That was something that was discussed at
length in the last RFC.
Can we use self-signed signatures
if we
have confidence in the
signer and the root of the
certificate? So these are are some of the
things that
we've been looking at. Passwords with
with this
guidance and a lot of activity around
authentication -
that was a big area. We knew that going
into this development
that people wanted to look at all of the
the improvements and the evolution of
authentication,
as well as just some clarity around,
you know,
physical security, looking at
requirement 11,
and some of the security systems and
the processes associated with that, and
looking at,
you know, we needed to start having
better authentication of the
vulnerability scans.
And then just the risk assessments. A lot
of new
conversation about what does a good
mature risk assessment
look like in that process that is
expected to happen every year?
And what could the PCI council be doing
to
provide clarity there as well? Yeah, it's
really interesting and I think back and
you said, you know, 14 years ago
the creation and I've been
with TouchNet for 13 years, and so been
talking PCI
almost as long as you guys have been
around. And just seeing that evolution
and the changes that really have to take
place from a security standpoint,
and again with new technology coming on
board, and new bad guys doing new bad
things, and
some of the changes, it's always evolving.
Oh yes, it really is.
And that's, you know, one
thing that I'd caution anyone
listening to this podcast -
is that you know the development
of the PCI DSS standard and the
expectation to meet new requirements is
always changing, or I should say that
it's actually
typically several years by the time
a standard comes out, because there's an
expectation that
you have to evolve to meet that new
security requirement.
So if I may just walk through
the timeline for PCI DSS. We
have, as I mentioned, began our third
RFC for this which happened -
will happen - over this fall. And then
we'll hope to complete
the standard and go - hopefully not at
3,200 comments again -
but if it is we'll we'll go through
that. But we're tentatively hoping to
complete the standard by mid-year
2021. And then all of the supporting
documents like the self-assessment
questionnaires,
updating the training, all the associated
program work,
all that will hopefully be completed by
the end of 2021.
And from there there's there's
timelines
and horizon for, you know, the expectation
of
implementing those new changes to the
standard.
And what will happen is we always run at
least
12 to 18 months, because this one's a
little bit
more significant it may be longer that's
not yet decided,
but we will have a transition period for
people being able to validate to version
3.2.1
of the PCI DSS and migrating to
DSS version 4.0 throughout 2022
and into at least mid-year of 2023.
And then we, for any new requirement
that's found within the standard,
there's always an additional sunrise
period.
So if there's new requirements that we
feel
are significantly different and they
will
require possibly adjustment by an
organization to complete,
then we will typically provide at
least two or three quarters
of additional time. So I wouldn't expect
any new requirements in PCI DSS 4
to have to be demonstrated and
validated to until
at least beginning of 2024.
Okay that's great. And I'll say that's
one thing that I know I've always
appreciated about the council
and the requirements. It seems like that
there's always plenty of time
from a vendor's perspective for us to
make changes if we need to, but also to
help educate
our schools. And I know that our
schools are very appreciative to be able
to have that time to truly
understand what it means to implement
before the compliance goes into
effect. So I really appreciate that
timeline.
Well, and Heather, you just mentioned
something that I think is really
important.
Nowadays no one operates
essentially their own
systems, it relies on third-party
subject matter experts and these service
providers and so there is
a longer period of time, you know, maybe
15 years ago when PCI Council was
getting started,
you'd go to your I.T. administrator
and say fix this, this is the new change.
But it there's a there's a longer
process just you mentioned, that
the vendors need to be aware of the
change, their clients need to be aware of
the change,
and everyone needs to be working in
partnership and concert. But that takes
additional time, additional communication.
So that's one of the reasons
that the the timelines that we create um
have
additional padding nowadays for
accommodating this new
way that we operate business. Yeah
again it's different than a decade or
plus ago, right? That's right.
And a lot of that really has to do with
the, you know, the emerging technologies
and standards. So
that leads us right into pillar three,
about emerging standards and
technologies. So with this
you know dramatic shift, really for
digital transformation,
what are the new standards focusing on?
Well one of the very recent
announcements
is around mobile payments. So we have
several standards in mobile payments,
and what we've seen is with COVID-19,
a global push for more
contactless transactions. And just
finding ways to leverage this
way of not having to touch the same
equipment that,
you know, through a registry or
somewhere else that you would have,
you know, many people would be coming
through. And so that's an opportunity for
us
as PCI Council we have existing PCI
requirements
for contactless, and trying to help guide
the next generation of technology.
So we just announced that we are
are having PCI contactless for mobile
devices that are
common off-the-shelf, you know, Samsung,
Android devices, Apple, and all these
type of
general consumer devices that may be
accepting payments. We are now doing it
with pin acceptance, or I should say
we're working on a standard.
And it will be out for RFC where where
people can
contribute to that. Another area that
we're looking at besides
mobile and and contactless is just
around
in general, how do we protect,
you know, payment data that's
in these evolving channels such as cloud?
So we have all of this new work in a
cloud task force. I'm very excited.
We have contributions from Google and
Amazon,
AWS, and Microsoft, among others.
And they're sharing how this cutting
edge way that the cloud
infrastructure environment is changing,
so we can leverage this technology
to have more secure confidence in
the protection
of payments in that environment as well.
And then regularly, you know, with this
pillar we're constantly looking at what
is the next generation of security?
What's the next generation of payments?
How do we incorporate dynamic data
elements into every payment transaction,
and what is the PCI Council's role to
protect the integrity and the
security of the authentication
associated with these transactions?
So I always get excited talking about
the future because I see
so many new things that will help
universities
so that they don't have to throw
another
10+ layers of security to the same
payment data.
But we can flip the problem and have
that payment data no longer be
as relevant on its own, and find ways
of dynamic
authentication, dynamic data, and that
I think
will really help a lot of
treasurers, and a lot of others around
the world as we continue
to mature in that area. Yeah I think
that's great, Troy. You know, what's
interesting is a couple things: one is,
you know, obviously "contactless" that is
the buzzword right now, as it should be,
and so we're really helping show our
colleges and universities how to have that
contactless campus, and mobile really is
a forefront of that.
But what I thought was really
interesting is we just did a student
study research
and asking about, "How are you making
payments?" And from a mobile perspective
and really said,
"If there was a university app for
taking payments, what is most important
to you?" And it was an open-ended question,
and security was one of the top reasons.
And i found that really interesting
because obviously
from our perspective, and from our our
school administrators,
security is always number one, but to
think that students are thinking that
way, too,
I just thought was so important. And
especially since you're really focusing
on
security payments. Well and that's
always
really nice to hear, because I think
in some ways
we've got so comfortable with
remote technology. And we have,
you know, this this acceptance that I
can give up my data
and it will be secure. And there's an
assumption of security,
and sometimes it may not be as well
designed as
as maybe as a consumer we would want it
to be. So
I do think that that's an
important
and interesting survey results that
you have. I'm glad you shared that with me,
I'm really glad to hear that. And so
finally, how do we get everybody on board?
The fourth pillar being
industry alignment, so that's probably
quite the challenge.
Yeah, and you know, you would think that
but at least for
our perspective, a lot of times it's
not, for the same reason you were just
talking about with the survey.
I think everyone wants good security.
The question - I guess except for cyber
criminals
would be the one exception to that.
But, you know, in general
people all want to do the same thing - the
right thing.
It's always about how do we go
about that?
And so in our work we want to make
sure that there are people that are
looking at
the same type of issues, but they
are
looking at it from a different lens than
payment security.
And I'll give a couple examples: one is
we're doing work
right now - you may have seen some
of the
announcements and and collaboration
we've done with NIST.
They developed a secure software
development framework.
We also developed a software security
framework,
and in their work they cite the PCI
standard over two dozen times or
about two dozen times.
And it shows where there's so much
alignment on good
software design. Now they're looking at
this from a broader perspective
than payments, they're looking at
government assets, they're looking at
protecting a
broader scope of data, but
it shows that you know good security
hygiene
is really neutral to the the industry.
And we're finding ways that we can
work with them to promote the
commonality. Because a lot of these
organizations
might have to demonstrate a good
security of software design
beyond just payments and PCI, but for
health care information if they transfer
bio data, or
in other fields of of interest to
them. So
that's important for us to make
sure that we align and promote
on that. Another example is with
ANTX 9.
We sit on many of their working groups
and boards,
we have a joint standard around PIN.
So the protections associated with
the PIN
number that is commonly used for
for debit
and other means. And so we find these
ways, we also see our data security
standard
I mentioned the 4.0. Previous versions
being mapped.
We have CIS, the Center for
Internet Security.
They're a board of advisor member of
ours. They've mapped their
their critical control objectives to PCI DSS.
We've done the same work with mapping
DSS to the NIST cybersecurity framework.
So these are important ways that we
demonstrate that
you may not have to do 15 different
assessments of the same
environment. It may be that the same type
of expectation in these different
standards
really is being met and the objective
being attained, and possibly, hopefully, maybe the
assessment that being done by only
one or two
times by an assessor. So that's
really important for us, not only for us
to
minimize the overhead for demonstrating
security, because we want people to be
doing security every day, but
being able to demonstrate it and
validate that we want that to be an
easier objective to attain. But also
allows us to work with these other
groups that might be seeing
risk in health care, risk in
power utilities, risk in other industries
that will eventually,
possibly be used and abused to
compromise
payment data. And so working together
across
industries helps us to prepare for what
future cyber threats there might be.
Yeah, that's great and really just shows
the reason why you have
these four pillars and have this focus
in all those areas to make sure
everything's really accounted for.
Absolutely, yeah. So what other areas
should our colleges and universities be
thinking about
when it comes to security and PCI
compliance?
Well I'll share a couple. First
is, you know, for the PCI Council
we are recognizing, and
actually prior to COVID-19, and we're
blaming everything on COVID-19 but I
think this one is
is fair, just because universities
were so impacted
by this, and having students that had to
be
now all of a sudden online. We were
trying to partner
with academia to have curriculum
in the schools. We
knew that there is a job shortage in
cyber security. This has been well
documented by Wall Street Journal.
I know that several other industry
organizations have come out with data
that says,
or really, the numbers are staggering in
the millions of jobs that
really need to be filled by cyber
security professionals. In fact
Isaka did and Isquare have done
surveys out to the industry.
One of those surveys was
demonstrating that during this
this influx time, this transition of
people going online, many of the cyber
security
professionals in their roles were
assigned to general I.T.
responsibilities, just to move and
be and be responsible for getting people
functional
and operating online. And their security
roles were
put on a shelf for a temporary
amount of time.
So we're looking at ways that we can
work with industry. We still have plans
for the future to have collaboration,
and I think for universities themselves
a couple of things that I would be
mindful of -
one is going back to e-commerce.
We see mage card as a
significant issue for anyone that has an
online business.
A mage card is a name given to organized
criminal groups that are able to insert
malware
into web pages, and it goes
undetected by by the merchants, by the
small businesses, it goes directly to
their customers'
mobile devices and laptops. And
that's an area that we've been
looking at. Online digital skimming, also
looking at all of the IOT devices that
are on campuses,
especially if there is not staff on
campus
to monitor these devices, and
check on them. We see a lot of
online skimming and other types of
activities we see.
I've heard stories that at the
last Comtec event that I
attended where a college kiosk coffee
maker
uh was compromised and led to a
good amount of cardholder data stolen
out of an
IOT coffee maker. So we are looking at
all these things and
those would be a couple of areas that I
would be mindful of,
obviously promoting good and regular
encryption - point-to-point encryption - for
any type of transactions that are
happening
over a campus setting. There's so much
that is happening
in the university arena that
I could probably spend an hour just
talking about specifically other things
that I'd love to
make uh universities aware of, but
I know our time has run short and I
do appreciate the platform to share just
what's
been happening in PCI Council. Absolutely.
Well thank you so much, Troy, for your
insights on this ever-evolving world of
PCI.
Thank you, Heather. Well it really is
clear how the strategic framework helps
focus on all the areas necessary
to ensure the best security for today's
environment.
Thanks for tuning in to this episode of
Focus.
Don't forget to subscribe so you can
stay up-to-date on the business of
higher education.
For more information, check us out at
touchnet.com.
Transcript source: Provided by creator in RSS feed: download file