How can we fight against fraud in the future in a much more complex ecosystem? The answer may be in the next generation of security technology and strategy. When the PCI Council first started 10 years ago, we had one goal – create and disseminate a global standard for cardholder data security. One that would align the existing payment brand compliance requirements, eliminate conflicts of security preference and provide a consistent voice for how to protect the confidentiality of account data. We’ve done that, and significantly improved payment security throughout the transaction process, all over the world.Today, as an industry, we are seeing the results of these efforts – awareness for payment security is now elevated to the boardroom, the vast majority of account data is encrypted and sensitive operations are isolated from the general organizational procedures.But the world of payments is moving at a fast clip. We’ve seen a true renaissance in the past five years when it comes to innovation for payment use and acceptance, and we can expect this to continue. Now more than 22 million merchants can accept payments at more than 42 million locations around the world. With these new merchants and newer payment channels comes new opportunity for criminals to exploit a broader attack surface to steal digital data and credentials.[ MORE ON PCI: PCI DSS – it takes a village ] So how can we fight against fraud in the future in a much more complex ecosystem? The answer may be in the next generation of security technology and strategy. Developing these key areas will be critical as payment security and compliance evolve:Dynamic data and authentication We have a luxury in payments that the account numbers are arbitrary and can change if necessary. With the introduction of payment tokens that generate ever-changing numbers we will reduce the incentive for theft of that information as it holds no value to perpetrate fraud. Additionally, we now have the ability to use many forms of dynamic authentication not previously available to verify our customers, employees and others accessing company systems. By using these random data attributes we can move away from relying exclusively on static authentication mechanisms like overly-used passwords. Continuous awareness and protection Our apps are getting smarter. Our phones and everyday devices are getting smarter. Why shouldn’t our security solutions evolve alongside the technology that is becoming better at self-learning? Engineering should include runtime security that doesn’t require as much manual intervention. I expect we will see more use of security methods beyond reactive monitoring controls that can develop threat modeling of their own environment and prevent new types of exploits immediately upon discovery.Additionally, we have yet to see significant improvement in self-detection of data breaches and poor recognition of exfiltration of sensitive data from our systems to unknown destinations. Verizon’s 2016 Data Breach Investigation Report emphasizes the need for improvement in this critical area, noting that that less than 20% of investigated breaches were self-discovered. Automating PCI DSS compliance documentation For me, one of the more disappointing aspects of the last 10 years has been the lack of a repeatable, automated process for documenting changes in the flow of datagrams or changes to technology assets that impact PCI DSS compliance. I still often hear that this is a highly manual process that creates gaps of knowledge between assessments. The more we can automate the documentation, and have confidence in the accuracy of that reporting, the better informed security leaders can be about the true current state of the environments we are asked to protect.Measure success and identify opportunities for improvement Too often the use of metrics has been underutilized in demonstrating to senior leadership auxiliary improvements to an organization, operational efficiency and overall reduction of risk. As reporting evolves, I’m optimistic that better formulas for overall security will significantly progress and be used not only for help with future investments but also as critical data points for cyber insurers and other external partners.Better service provider securityWe’ve made significant strides in the past 10 years when it comes to the growing dependency on third parties to manage data and technology. We’ve witnessed the maturation of service-level agreements with cloud service providers and a willingness to be more transparent regarding the security of their environments. There is greater awareness of their role to support compliance initiatives and creating security as a service to differentiate themselves from competition. These are critical areas since we expect cloud data centers to process 86 percent of total workload by 2019, according to a recent Cisco survey.We have great opportunities to improve the future of payment security and compliance through the evolution of these technologies and processes. In future blog posts I will explore each of these areas and share how we can develop strategy to better secure customers’ account data, while also minimizing the effort to demonstrate good security practices are in place and functioning as expected. Related content opinion Software and the acceleration of payment security As the way payments are accepted continues to change, the PCI Security Standards Council CTO discusses how the Council is supporting these advancements in payments with security standards to protect payment data. By Troy Leach Sep 13, 2017 5 mins Small and Medium Business Mobile Security Cybercrime opinion CISOs need to keep up with the hyper pace of security By Troy Leach Feb 15, 2017 4 mins Internet Security Internet of Things IT Leadership opinion Promoting efficiencies through security metrics Creating metrics for a security program can be a challenge for many organizations. Troy Leach, CTO of Payment Card Industry Security Standards Council, discusses best practices for creating meaningful security metrics. By Troy Leach Jan 05, 2017 4 mins IT Strategy ROI and Metrics Analytics Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe