advertisement
advertisement

This is page 2 of:

NRF + PCI = CIO Job Security

January 14th, 2010

More people will want and need access to all kinds of customer data. Yet a principle of PCI is limiting access to who can see the data and how much they can see. What’s a CIO to do?

My guess is that each company will make tradeoffs based on business requirements. The one thing that is beyond discussion, in this QSA’s opinion, is that the CIO owns the data. The reason I say that is because in response to a question about who owns the data, I heard someone say “Everyone owns it.”

Unfortunately, the reality is that when everyone owns something, no one owns it (If you don’t believe me, walk into a public lavatory some time). Everyone may have an interest in the data, but reality dictates that there is only one owner and that owner is the CIO.

On the NRF expo floor, I asked several software and hardware vendors plus bank acquirers and card processors what were they hearing from the other attendees (versus what they were pitching). I was pleasantly surprised when they said people were asking about PCI and how the vendor’s product could help the merchant get compliant. “You hear PCI everywhere,” one said.

Both tokenization and E2E encryption technologies were well represented at the NRF conference. At a retail CIO workshop before the NRF (where I participated in a panel discussion), two-thirds of the attendees said they were exploring not one approach but both tokenization and E2E technologies to help with PCI compliance. The number who said they were solely doing tokenization was—not surprisingly—zero.

Another sign that the technologies are maturing is that I didn’t hear any vendors on the expo floor overpromising. Every single one that I heard from emphasized that it could only reduce–often dramatically–a merchant’s PCI scope; not one vendor promised a silver bullet.

I am a fan of both tokenization and E2E encryption, but only when properly implemented. Each has advantages. There seems to be two general approaches to tokenization: generate a unique token for each transaction or generate an identical token if the same card is used again.

Although either can do the job, it seems the latter approach may lend itself more easily to replacing cardholder data (e.g., PANs) in velocity checking and CRM systems and, ultimately, to removing those systems from PCI scope. Because the goal is to minimize PCI scope, this latter approach may be the easier path to taking more systems out of scope if you are looking at tokenization.

I’d like to hear what you think. Were you at the NRF expo? What did you hear about PCI? Are you looking at tokenization and E2E encryption? If you had to skip the “Big Show” this year, what did you miss? Do you plan to be the database rock star of your company? Leave a comment or E-mail me at wconway@403labs.com. I want to hear from you. And special thanks to all of you who have left comments or sent me E-mails.


advertisement

One Comment | Read NRF + PCI = CIO Job Security

  1. Mark Bower Says:

    A nice summary. NRF was certainly buzzing around true End-to-end encryption and tokenization. We’re not taking point to point. End-to-End is from swipe to acquirer, and/or swipe to PAN dependent merchant system – something only possible with new approaches I’ve mentioned here in the past.

    What was interesting to me was seeing the contrast in the efforts of various approaches being tried. Some merchants we met for the first time had been struggling for 2 years already or more trying to achieve this and still stuck in pilot with older style tokenization and legacy encryption which struggles when it comes to the change impact in legacy hardware/software and when taking into account critical back office functions like velocity checking and fraud investigations, e-discovery etc. When I described how we’d already taken Tier 1’s through this to PCI compliance in a fraction of that time with Format Preserving Encryption there was a lot of excitement – these new approaches avoid exactly the change impact they were struggling with in integrating encryption and tokenization into the complex merchant legacy environment and processes.

    Another highlight for me was how many merchants really do see the need to go well beyond PCI DSS which as you note is falling behind the fast path merchants are heading in new areas like mobility – what a hot topic at NRF! Merchants not only want to explore new payments acceptance like mobile, but want to also cover employee data, partner communications, and other privacy regulated data in a single swoop. Of course, our conversations drift to those areas as we solve those challenges too with our overall data protection platform – but it was striking nonetheless. The concern being what’s the point of investing several million in PCI compliance and focus just on credit card data and and leaving equally sensitive data at risk – SSN’s, Tax Data, competitive strategy information, HR data on vast numbers of past and present employees in a very high staff turnover business.

    So from uplifting show at NRF I see 2010 being one of not only E2E and Tokenization in the payments side, but solving the big picture – sensitive data organization wide. That’s where the real ROI will be for merchants in data protection investments. No point being the front page breach news if your systems are compromised and all your employee data is exposed – its the same reputation and brand damage impact.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.