|7:30-9:15||Networking Breakfast and Vendor Showcase
Presented by: Jeremy King, International Director – Europe, PCI Security Standards Council
|9:30-10:30||Keynote: Cyber Security in the Age of Espionage
Presented by: Eric O'Neill, Former FBI Counterintelligence Operative, Founder, The Georgetown Group and National Security Strategist, Carbon Black
The Internet is not a safe environment. It is a frontier. Recent years have seen a massive increase in cyber theft of private and confidential information from government agencies, business and private individuals. The modern spy is responsible for these attacks. Today s spies are sophisticated, brilliant, devious and technologically advanced, and they are targeting your data. Robert Hanssen was the first of these new cyber spies, charged with selling American secrets to Russia for more than US$1.4 million in cash and diamonds. His ability to exploit computer systems allowed him to protect his identity during a 22-year spy career. Join Eric as he uses real-life spy stories to show how careful diligence, counter-espionage techniques, and restraint in social media can help identify the numerous spies, hackers, hacktivists and trusted insiders that threaten every stroke of the keyboard.
|10:30-11:00||Networking Break and Vendor Showcase
Sessions will examine technical aspects of payments security standards and implementation. Best suited for those interested in looking at processes and technologies used to protect payment data and supporting systems.
Sessions will examine business challenges within payment security and include case studies and best practices. Best suited for those interested in strategic planning and implementation of governance programs for making payments safer.
|11:00-11:30||Mobile Payment Initiatives|
Presented by: Elizabeth Terry, Advanced Research Manager, PCI Security Standards Council and Michael Thompson, Senior Manager, Emerging Standards, PCI Security Standards Council
The PCI Council will provide an overview of recent mobile payment initiatives, which will include the recently released Software-based PIN Entry on COTS (SPoC) Standard in addition to the effort regarding contactless payment acceptance on merchant COTS devices.
|PCI DSS: The Future is Now
Presented by: TBD, PCI Security Standards Council
For a long time organizations have been looking “forward” to implementation dates and deadlines that would arrive sometime in the future. With the release of PCI DSS v3.2.1, that future is now the past. Join this session to learn about what PCI DSS means today and how the security standard is shaping up for the future.
|11:40-12:10||Session TBD||PCI DSS and Cloud - Navigating in Reduced Visibility
Presented by: John Markh, Standards Manager, PCI Security Standards Council and 2017 Cloud SIG participants TBD
As more and more business adopt cloud infrastructure and services, there is a need to better understand the business, technical and operational issues that may impact the security of payment data. In the session, the presenters will share their experiences managing PCI DSS compliance in cloud deployments.
|12:20-12:50||Broken Foundations - The Deep Malaise of Inadequate Patch Management|
Presented by: Jacob Ansari, Director, Schellman & Company, LLC
Advances in information security tools and practices have not alleviated the fundamental need for aggressively applying security patches and fixes to systems. Furthermore, regular security studies about security incidents show the need for prompt and thorough updates. Despite this, many organizations fail to prioritize this or struggle to execute successfully. This session will explore some of the reasons for this and consider some solutions.
|Women in PCI and Cybersecurity Panel
Moderated by: Gill Woodcock, Senior Director of Certification Programs, PCI Security Standards Council
Panelists: Stacy Hughes, SVP of Risk and Compliance, Global Payments, Tracey L. Long, Senior Payment Data Security Manager, WorldPay, Stanley Skoglund, Co-founder & Director, The Minerva Partnership, and Phyllis Woodruff, Vice President of Security Programs and Standards, Fiserv
Women comprise only 11 percent of the global information security workforce. This panel will discuss: How everyone got involved in PCI, lessons learned, key challenges facing us now, mentoring the next generation, how to overcome obstacles, advice for women and men getting into the field and what the future brings.
|12:50-13:50||Networking Lunch and Vendor Showcase
|13:50-14:20||Passwords are NOT What They are CRACKED Up to Be (Live Demo) |
Presented by: Rob Harvey, Risk, Security and Privacy, Online Business System and Adam Kehler, Senior Consultant - Risk, Security and Privacy, Online Business Systems
In this session, Online Business Systems will demonstrate ways for retailers to implement stronger password composition and storage mechanisms to ensure account credentials are not at risk. Through audience participation, we will generate a compliant password and then use password cracking tools to break it. We will provide practical recommendations on how to strengthen your cybersecurity program in accordance with the new NIST Special Publication 800-63B Digital Identity Guidelines.
|How are New Privacy Regulations Affecting Your PCI Program
Presented by: Adriana Gliga-Belavic, Partner Cyber Security and Privacy, Canadian Payments Security & PCI Practice Leader, PricewaterhouseCoopers LLP (PwC)
Managing newly introduced privacy regulations in Europe and North America are hitting the news almost every day. In this changing environment, where credit card information is also considered personal information, most privacy standards and regulations will dictate how this data must be collected, used and disposed of. Both PCI DSS and privacy regulations have the same objective, which is to protect customer data, but are there aspects in common, and can we leverage our compliance efforts to meet both effectively? Find out more in this session.
|14:30-15:00||Proliferation of Point-to-Point Encryption (P2PE)|
Panel Moderated by: Dan Fritsche, Vice President, Solution Architecture, Coalfire
Panelists: Ruston Miles, Chief Strategy & Innovation Officer, BlueFin
This will be an all industry panel discussing the proliferation of point-to-point encryption (P2PE). The purpose of the session is to share real-life experience for validating and implementing P2PE solutions with merchants, gateway and solutions providers and will cover:
• Use Case of a listed P2PE partnership
• Best Practices for P2PE
• What is fueling the growth of listed solutions and why should merchants adopt them?
• How does P2PE help a merchant to protect their environment?
• What is the fine balance between operations, security, and compliance?
• How can we leverage third-party solution providers to protect the merchant’s environment?
|Compliance Cycles and Close Calls
Presented by: Jean-Louis Lamacchia, Standards Development Manager, PCI Security Standards Council and 2018 SIG participants TBD
It’s been a busy year for Special Interest Groups (SIGs). In this session, the Chairs and participants of the 2018 SIGS “Maintaining PCI DSS Compliance” and “Securing Telephone-Based Payments” will share their insights on these topics and what to look forward to in the upcoming guidance documents.
|15:10-15:40||Cryptography Prepares for Schrodinger's Cat |
Presented by: Ralph Spencer Poore, Director, Emerging Standards, PCI Security Standards Council and Steve Stevens, JD, Executive Director, X9 Financial Services, Inc.
Preparing for the inevitable changes in cryptography ranging from the latest moves by PCI SSC through to Quantum Resistant Algorithms. This session discusses the need for crypto-agility, i.e., isolating cryptographic functions to help futureproof your organization since cryptographic algorithms of necessity change as technology and cryptanalysis improve.
|Internet of Payments - Payment Services for an IoT-infrastructure
Presented by: Joachim Dorschel, Managing Partner, DPS Engineering GmbH
More and more IoT use cases require payment functions. Machine-to-machine-payments will emerge as an essential part of many IoT business models and related applications. Existing IoT platforms are focused on device management and big data analysis. Existing payment services are designed for human interaction. In this use case learn how a generic approach of bringing these two worlds together and how to apply this approach to an existing environment: payment of parking services in car parking.
|15:40-16:10||Networking Break and Vendor Showcase
|16:10-16:40||‘You Shall Not Pass!' Segmentation Done Right |
Presented by: Joseph Pierini, Vice President, PSC and Phyllis Woodruff, Vice President of Security Programs and Standards, Fiserv
Segmentation isn't easy. There are many processes and systems that need access to the CDE and isolating the card data from the rest of the business can break critical business needs. Segmentation, when done right, can allow the business to continue without interruption while securing PAN data against unauthorized access. PSC has pen tested hundreds of segmentation designs and has seen some that work, some that might work and some that were a waste of money and resources. In this session, we'll cover the common points of compromise to your network and review the most common segmentation design schemes to identify which ones are smoke and mirrors and which ones can stand up against a direct assault.
|PCI DSS Control Framework at Royal Dutch Shell
Presented by: Erik Pols, Retail Information Risk Manager, Royal Dutch Shell Ltd. and Rodolphe Simonetti, Managing Director, Security Consulting, Verizon
For PCI DSS Compliance, Royal Dutch Shell developed a Control Framework to embed and sustain PCI compliance activities to be better prepared for future changes of the standard, technology or business processes. Shell is managing PCI DSS requirements by operating 55 controls. The approach required the support of the QSA (Verizon) who had to align their ways-of-working. In this case study, Shell and Verizon will show the challenges faced when creating and implementing the PCI DSS Control Framework and the benefits when assessing Shell's retail markets.
|16:50-17:20||How the H@ck R U? Insider Look into Cybercrime Dark Web |
Presented by: Angel Grant, Director, Identity, Fraud and Risk Intelligence, RSA
Digital channels are ground zero in the fight against fraud. With 3B+ consumer credentials stolen annually, cybercriminals have the advantage and are looking to execute upon them. In this session, take a tour of the Dark Web, learn how cybercriminals hunt for potential points of compromise in our payments ecosystems, explore popular credential stuffing toolkits, and the use of social media as a rising cybercrime communication channel.
|You Can Be Open with Your Acquirer, We're Not the PCI Police
Presented by: Ian Butler, Head of EU Security Products, Elavon Merchant Services
Your acquirer should be your best friend and confidante when it comes to PCI. Join this session and learn how your acquirer can help you tackle your PCI scoping and compliance challenges.
|17:30-18:00||What’s Your User [Security] Story!?!: Engaging Developers in the Battle for Software Security Supremacy|
Presented by: Jake Marcinko, Standards Manager, PCI Security Standards Council
As cyber-attacks increasingly target applications, software vendors and software developers are becoming more engaged in efforts to combat and prevent cyber-attacks. However, software development personnel have different priorities than security experts, and security experts need to be able to articulate security needs in development terms in order to bridge the gap. Join us for a panel discussion on modern trends in software development, the methods in which developers measure quality and success, and discover what the PCI SSC is doing to engage the Software Development Community and to improve the quality and security of payment software.
|Choose Wisely: Tips on Selecting the Right Payment Terminal for your Business
Presented by: Berny Goodheart, Standards Manager, PCI Security Standards Council
A terminal can represent a business critical piece of equipment that may have a multiyear commitment for your business, yet many people do not understand what this means to their business. This presentation will communicate:
1. What are the different terminal types and understanding the acronyms alphabet (POS, PTS, POI, HSM, EPP, PED, SCR, SCRP, UTP)
2. Understanding the normal use case or cases for different terminal types
3. How to validate the device is indeed a PCI PTS approved device.
|18:00-19:30||Networking Reception and Vendor Showcase