1 / 13

Preparing for & Maintaining PCI Compliance

Preparing for & Maintaining PCI Compliance. Topics of Discussion. About Link2Gov Establishing security policy and e-commerce infrastructure Preparing for the audit Facility and resource requirements during the audit Responsiveness to findings Maintaining security standards following audit

Download Presentation

Preparing for & Maintaining PCI Compliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Preparing for & Maintaining PCI Compliance CONFIDENTIAL

  2. Topics of Discussion • About Link2Gov • Establishing security policy and e-commerce infrastructure • Preparing for the audit • Facility and resource requirements during the audit • Responsiveness to findings • Maintaining security standards following audit • Marketing PCI compliance • Questions CONFIDENTIAL

  3. About Link2Gov • Our mission is to be the premier provider of integrated IP payment services using web, telephony, point of sale and other transaction technologies. CONFIDENTIAL

  4. Payment methods include: Credit Cards ATM/Debit Cards (PIN-Secured) Check Cards (Signature-Debit) Electronic Checks (Conversion, Verification and Guarantee) Payment channels include: Point-of-Sale (POS) Internet Interactive Voice Response (IVR) Mail and Kiosks About Link2Gov CONFIDENTIAL

  5. About Link2Gov • IP Gateway • Virtual Terminal: LINK2POS • Network Controlled VeriFone POS Terminals • Web & IVR Application Generator & Hosting • Consolidated Real-Time Internet Reporting • Flexible Funding Models CONFIDENTIAL

  6. Establishing security policy and e-commerce infrastructure • Ecommerce Infrastructure • Documentation • Implementation • Enforcement • Policy CONFIDENTIAL

  7. CONFIDENTIAL

  8. Preparing for the audit • Yearly Changes • Computer Security Test Plan Review • Configuration Management Plan • Risk Assessment Plan • Disaster Recovery Plan • Trusted Facilities Manual CONFIDENTIAL

  9. Facility and resource requirements during the audit • Staffing • Travel • Infrastructure CONFIDENTIAL

  10. Responsiveness to findings • Reviewing Findings • Verify Results • False Positives • Exceptions • Implementation • Configuration Management CONFIDENTIAL

  11. Maintaining security standards following audit • Security Policy Documentation • Enforcement • Audit Trail • System Logs • Accounting • Change Control CONFIDENTIAL

  12. Marketing PCI compliance • Cost Avoidance Through L2G Products • Pass Thru • Web / IVR • Security Validation by Third Party • Certifications CONFIDENTIAL

  13. Questions CONFIDENTIAL

More Related