07:21 PM
Dark Reading
Dark Reading
Products and Releases

PCI DSS Names New Chair

Payment security expert from MasterCard will help guide Council through release of new PCI Standards in 2010

WAKEFIELD, Mass., Jan. 25, 2010 — Today, the PCI Security Standards Council, a global, open industry standards body providing management of the Payment Card Industry Data Security Standard (PCI DSS), PIN Transaction Security (PTS) Security Requirements and the Payment Application Data Security Standard (PA-DSS), announced that Bruce Rutherford, group head, fraud management solutions, payment system integrity, MasterCard, has been appointed as the new chairperson of the PCI Security Standards Council. Rutherford will steer the Council as it works with industry stakeholders to create and release new standards in 2010.

"It is a very exciting time to take the reins of the Council," said Rutherford. "Under the previous leadership of outgoing chairperson, Lib De Veyra, we had great success elevating awareness of the PCI Standards globally and providing the industry with a better understanding of how to address payment security challenges. In 2010, I look forward to working with everyone in the payment chain to continue this momentum, as well as developing the next generation of standards we can all use to protect sensitive payment information."

Per the Council's bylaws, the chairperson is rotated annually among each of the five payment card brands that make up the Council's Executive Committee: American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc.

In his new position, Rutherford succeeds Lib De Veyra, vice president, emerging technologies at JCB International who held the position during the Council's important feedback period within the standards lifecycle. Under his auspices, the Council elected a new Board of Advisors, introduced the Prioritized Approach to PCI DSS, wireless guidelines and skimming prevention tools, expanded the PTS requirements to include new devices and collected industry-wide feedback to shape the next iterations of PCI standards.

"Bruce has already contributed to the Council significantly in his role as a member of the Executive Committee," said De Veyra. "I can think of no one more qualified and capable to unite stakeholders together as we look to the release of the new DSS and PA-DSS later this year."

As chairperson, Rutherford will work with the Council's Board of Advisors, Participating Organizations, assessor community and merchants globally to increase adoption of the PCI standards. In addition he will work with stakeholders to refine the draft iteration of the next release of the PCI standards and help educate and prepare the market place for the updates.

"This next year will be crucial for developing the ongoing practices and disciplines necessary for the security of payment card transactions," said Bob Russo, general manager, PCI Security Standards Council. "I look forward to working closely with Bruce and the rest of the Council's stakeholders to continue to improve payment security globally."

During his more than 12 years at MasterCard, Rutherford has experience in many facets of the payments security world. As group head, fraud management solutions, he is responsible for the product management, development, sales, and implementation of MasterCard fraud management solutions; the evolution and deployment of industry standards including the PCI Standards and MasterCard SecureCode; product management and related operations for holograms; fraud reporting and associated data analytics; and for risk/fraud training through the Academy of Risk Management. Rutherford is a graduate of The Pennsylvania State University and holds a Bachelor of Science degree and a Master of Business Administration degree.

About the PCI Security Standards Council

The mission of the PCI Security Standards Council is to enhance payment account security by driving education and awareness of the PCI Data Security Standard and other standards that increase payment data security.

The PCI Security Standards Council was formed by the major payment card brands American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. to provide a transparent forum in which all stakeholders can provide input into the ongoing development, enhancement and dissemination of the PCI Data Security Standard (DSS), PIN Transaction Security Requirements (PTS) and the Payment Application Data Security Standard (PA-DSS). Merchants, banks, processors and other vendors are encouraged to join as participating organizations.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.