Data breaches inflicted a significant financial toll in 2022, averaging $4.35 million in costs. These figures underscore the urgent need for robust data security measures, particularly within organizations handling payment card information.
The Payment Card Industry Data Security Standard (PCI DSS) is a pivotal framework for fortifying data security, especially concerning payment cards. It comprises a set of well-recognized policies and procedures geared toward enhancing the security of credit, debit, and cash card transactions while safeguarding cardholders’ personal information.
Under the governance of the Payment Card Industry Security Standards Council (PCI SSC), which is a consortium comprising major credit card companies, PCI DSS has a central goal of reducing the risk of cybersecurity breaches concerning sensitive data and mitigating the potential for fraud within organizations that handle payment card information. This collection of standards holds vital importance for various entities, including service providers and merchants, involved in card data processing, storage, or transmission.
Accorian holds the prestigious distinction of having a team of highly Qualified PCI QSAs (Qualified Security Assessors) specializing in assessing PCI compliance, particularly emphasizing network infrastructure. We are also CREST accredited and an ASV (Approved Scan Vendor). Our PCI accreditations underline our expertise and credibility in cybersecurity and PCI DSS compliance.
Our potential client industry includes sectors such as banking, financial services, credit unions, eCommerce, and SaaS that must adhere to payment card industry DSS requirements.
Our certified QSAs play a pivotal role in safeguarding cardholder data. They conduct on-site and remote assessments of security controls, offering valuable insights and recommendations for improvement. They also support developing and implementing essential security policies and procedures.
As ASV, we conduct comprehensive vulnerability assessments and penetration testing, helping organizations fortify their security measures. We meticulously define the scope of PCI compliance by evaluating critical components like firewalls, routers, and switches. This assessment also identifies programs, subnets, and network segments for handling cardholder data.
In March 2022, the Payment Card Industry Security Standards Council unveiled the latest iteration of PCI DSS, marking a significant transition from v3.2 to v4.0. This update provides a more defined vision of the future payment security landscape.
Determine the applicable scope, with or without the inheritance of controls and card flow
Assist in understanding your current readiness concerning PCI DSS compliance
Streamline PCI DSS requirements by providing remediation guidance, aiding in evidence collection, providing program management, and augmenting your team to assist in remediation efforts
Assist in developing or updating your security framework and policies
Conduct a readiness audit to ascertain that you meet the PCI requirements
Help complete and submit your Self-Assessment Questionnaire (SAQ)
Perform a final audit with reporting conducted by our Qualified Security Assessor (QSA)
Conduct the mandatory quarterly PCI Approved Scanning Vendor (ASV) network scans
PCI standards have a broader impact on the payment card industry, encompassing all companies that handle credit card transactions and have access to cardholder data (CHD) or sensitive authentication data (SAD). This standard also extends to service provider companies involved in credit card processing, whether directly or indirectly, due to the influence of their Third-Party Risk Management Strategy.
As a result, payment card industry compliance is a benchmarking security standard for various organizations, irrespective of their size, transaction volume, or how they collect information (directly or indirectly).
PCI DSS companies must adhere to 12 fundamental PCI DSS compliance requirements to handle credit card data securely. Non-compliance of which elevates the risk of data breaches and fraud.
Install a firewall to protect cardholder data
Protect stored cardholder data
The PCI DSS categorizes companies into four merchant levels based on the volume of transactions they process yearly.
Level 1 merchants are subject to audits by PCI QSAs (Qualified Security Assessors). This audit has more stringent requirements than other levels, creating a PCI RoC (Report on Compliance). This report uncovers findings by reviewing the organization’s security policies, procedures, and controls to protect cardholder and account data. The audit also encompasses an on-site assessment and an evaluation of any compensatory controls.
The audit takes place annually or when there’s a change in the environment. Complying with PCI Level 1 and RoC requirements demands meeting a high number of criteria, substantial implementation efforts, significant time costs, and a rigorous approach. Once RoC is obtained through assessment by a PCI QSA, the company is eligible to display the PCI Compliant logo.
Companies must submit their SAQs (Self-Assessment Questionnaires) for all three merchant levels. There are 9 types of SAQs, each with varying requirements, ranging from 24 to 370.
Furthermore, non-level 1 merchants may be required to undergo a PCI RoC audit in certain instances due to their crucial role in the supply chain. This is decided by the acquirer or, sometimes, requested by end clients.
Choosing the right SAQ (Self-Assessment Questionnaire) ensures that your organization complies with the relevant PCI DSS requirements.
SAQ A
For e-commerce/mail/telephone-order (card-not-present) merchants who have completely outsourced all cardholder data functions. The merchant must not have electronic storage, processing, or transmission of any cardholder data on his systems or premises.
24
PCI DSS SAQ TYPE – SAQ A
Eligibility Criteria
For e-commerce/mail/telephone-order (card-not-present) merchants who have completely outsourced all cardholder data functions. The merchant must not have electronic storage, processing, or transmission of any cardholder data on his systems or premises.
No. of Questions – 24
SAQ A-EP
For e-commerce-only merchants that rely on third-party service providers to handle card information and have a website that doesn’t process credit card data but could impact the security of the payment transaction. The merchant must not have electronic storage, processing, or transmission of any cardholder data on his systems or premises.
192
PCI DSS SAQ TYPE – SAQ A-EP
Eligibility Criteria
For e-commerce-only merchants that rely on third-party service providers to handle card information and have a website that doesn’t process credit card data but could impact the security of the payment transaction. The merchant must not have electronic storage, processing, or transmission of any cardholder data on his systems or premises.
No. of Questions – 192
SAQ B
For merchants who utilize imprint machines and/or standalone dial-out terminals and do not transmit, process, or store electronic cardholder data. This does not apply to e-commerce activities.
41
PCI DSS SAQ TYPE – SAQ B
Eligibility Criteria
For merchants who utilize imprint machines and/or standalone dial-out terminals and do not transmit, process, or store electronic cardholder data. This does not apply to e-commerce activities.
No. of Questions – 41
SAQ B-IP
For merchants using only standalone, PTS-approved payment terminals with an IP connection to the payment processor and who do not store electronic cardholder data. This does not apply to e-commerce activities.
87
PCI DSS SAQ TYPE – SAQ B-IP
Eligibility Criteria
For merchants using only standalone, PTS-approved payment terminals with an IP connection to the payment processor and who do not store electronic cardholder data. This does not apply to e-commerce activities.
No. of Questions – 87
SAQ C-VT
For merchants who utilize a virtual terminal on one computer dedicated solely to card processing and who do not store electronic cardholder data. This does not apply to e-commerce activities.
161
PCI DSS SAQ TYPE – SAQ C-VT
Eligibility Criteria
For merchants who utilize a virtual terminal on one computer dedicated solely to card processing and who do not store electronic cardholder data. This does not apply to e-commerce activities.
No. of Questions – 161
SAQ C
For any merchant who utilizes a payment application connected to the internet without electronic cardholder data storage.
84
PCI DSS SAQ TYPE – SAQ C
Eligibility Criteria
For any merchant who utilizes a payment application connected to the internet without electronic cardholder data storage.
No. of Questions – 84
SAQ P2PE
For merchants who utilize approved point-to-point encryption (P2PE) devices with no electronic cardholder data storage.
34
PCI DSS SAQ TYPE – SAQ P2PE
Eligibility Criteria
For merchants who utilize approved point-to-point encryption (P2PE) devices with no electronic cardholder data storage.
No. of Questions – 34
SAQ D for Merchants
For all SAQ-eligible merchants who don’t meet the criteria for other types. For merchants who do not outsource their credit card processing or use a P2PE solution, they may store credit card data electronically.
328
PCI DSS SAQ TYPE – SAQ D for Merchants
Eligibility Criteria
For all SAQ-eligible merchants who don’t meet the criteria for other types. For merchants who do not outsource their credit card processing or use a P2PE solution, they may store credit card data electronically.
No. of Questions – 328
SAQ D for Service Providers
For service providers deemed eligible to complete an SAQ
370
PCI DSS SAQ TYPE – SAQ D for Service Providers
Eligibility Criteria
For service providers deemed eligible to complete an SAQ
No. of Questions – 370
For level 2-4 merchants, it’s crucial to complete the SAQ by providing answers to all questions, indicating compliance, or stating specific requirements as “not applicable.” Even if a single question is left unanswered, the merchant will be considered non-compliant and must promptly address and mitigate the associated risks.
Each SAQ includes an expected testing column that offers guidance to merchants, describing the testing activities necessary to demonstrate PCI DSS compliance.
After finishing the SAQ, an Attestation of Compliance (AoC) is required, which must be completed by the merchants and signed by
the company’s CISO or officer.
6,Alvin Ct, East Brunswick, NJ 08816 USA
Toronto
Ground Floor,11, Brigade Terraces, Cambridge Rd, Halasuru, Udani Layout, Bengaluru, Karnataka 560008, India
Role Summary:
As a wordpress developer, you would be responsible for the development, maintenance, and optimization of our company’s website. This role requires a strong understanding of web development technologies, content management systems, and a keen eye for design and user experience. You will play a crucial role in enhancing our online presence and ensuring a seamless user experience for our audience.
Mandatory Skill Sets/Expertise:
Key Attributes:
Key Responsibilities:
Role Summary
The senior manager is responsible for leading and sustaining the team that drives the compliance strategy by working collaboratively with internal teams, SMEs, external customers, vendors, auditors and other stakeholders. He/she should be able to work collaboratively with other departments and stakeholders to achieve company-wide goals and satisfy the client.
Mandatory Skill Sets/Expertise
Key Attributes
Key Responsibilities
Role Summary:
The Sr. Security Consultant / Team Leader is responsible for leading a team of Security Consultants, managing team and professional development goals, ensuring on-time delivery of GRC projects, and providing expert guidance to team members on GRC-related matters.
Mandatory Skill Sets/Expertise
Key Attributes:
Key Responsibilities:
Role Summary
Accorian is actively seeking for a dynamic and seasoned Consultant/Senior Consultant specializing in
the Governance, Risk, and Compliance (GRC) domain to join our team. The preferred candidate will
assume a pivotal role in providing strategic guidance to clients regarding the implementation of sound
risk management practices overseeing vendor relationships, conducting audits across various
frameworks, and harnessing the capabilities of the GRC tool. This multifaceted position necessitates a
profound comprehension of GRC principles, regulatory compliance, and the ability to implement
resilient risk management strategies. Collaborate extensively with cross-functional teams, conduct
evaluations of organizational processes, and deliver strategic recommendations aimed at enhancing
GRC frameworks.
Mandatory Skill Sets/Expertise
1. Bachelor’s or master’s degree in computer science, Information Security, Risk Management,
Cyberlaw, or a related field.
2. Proficient in leading GRC frameworks and methodologies (SOC, ISO 27001, HIPPA, NIST, PCI DSS,
etc.).
3. Strong understanding of cybersecurity frameworks and principles (e.g., NIST Cybersecurity
Framework, ISO 27001, HIPAA).
4. Familiarity with audit processes, internal controls, and assurance methodologies.
5. Experience with GRC software solutions (e.g. SAP GRC, ACL, Archer, etc.).
6. Knowledge of risk assessment, control design, and reporting methodologies
7. Ability to work independently and as part of a team.
Preferred Certifications: CISSP, ISO 27001 Lead Auditor or Implementer.
Key Attributes:
a. 1 – 3 years of experience in consulting or industry roles related to GRC.
b. Proven track record of successful GRC program implementation and optimization.
c. Customer-centric mindset with a focus on understanding and addressing clients’ unique needs.
d. Ability to translate complex technical concepts into clear and actionable insights for clients.
e. Passion for staying up to date on the latest trends and developments in GRC.
f. Strong work ethic and a commitment to delivering high-quality results.
g. Add on Strong project management skills to successfully lead and execute projects.
Key Responsibilities:
1. Assessing cybersecurity risks and vulnerabilities and partnering with the security team to identify
and analyze potential threats, evaluating their impact and likelihood of occurrence.
2. Developing and implementing GRC strategies to analyze industry regulations and standards
relevant to cybersecurity, translating them into practical policies and procedures for our
organization.
3. Conducting GRC audits and collaborating and performing regular evaluations of our security
controls and compliance measures, identifying gaps, and recommending improvements.
4. Collaborating with strategic-integration and fostering strong relationships across various
departments (IT, security, legal, compliance) to ensure seamless integration of GRC processes and
cybersecurity initiatives.
5. Provide expert advice on GRC strategies, frameworks, and methodologies to clients.
6. Collaborate with internal and external auditors, providing necessary documentation and support
for audits.
7. Ensure clients’ adherence to relevant regulations, standards, and industry-specific compliance
requirements.
8. Developing and delivering training programs to educate employees on cybersecurity best
practices and compliance requirements, promoting a culture of security awareness.
9. Staying informed on emerging threats and regulations and continuously update your knowledge
on the evolving cybersecurity landscape and adapt your strategies accordingly
Role Summary
The role of the Project Manager would be to help plan and track cybersecurity & technology projects to meet KRAs, milestones & deadlines. This would also include coordinating. meetings with clients & internal teams and resource planning. The primary KRA would be to ensure projects are delivered on a timely manner and all stakeholders. are updated about the latest status of the project.
Mandatory Skill Sets/Expertise
Key Attributes
Key Responsibilities: –
Role Summary:
As the Lead Software Architect, you will be a key leader in the development and evolution of our B2B SaaS product & it’s associated systems. The entire development team will report to you.
Drawing upon your extensive technical expertise and industry knowledge, you will design and implement scalable, robust, and efficient software solutions. Collaboration with cross-functional teams, technical leadership, and staying abreast of emerging technologies will be essential for success in this role.
About Our Product:
GORICO was incepted by security practitioners & audits with decades of experience to simplify the security conundrum and streamline the security compliance and security maintenance process. Security is a growth enabler today as it’s table stakes for doing business and a mandatory requirement as part of the third-party risk strategy of clients.
This is a single solution tailored to an organization to manage all your security adherence, compliance, vendor risk, vulnerability management , policy & procedure management and risk assessment needs.
It enables behaviour change and shift in the mindset towards security. It’s the only way to address the current reactive approach to it. Hence, going from a once a year or, couple of times a year audit rush to year long sustenance of security.
Hence, GORICO empowers organizations to understand, attain and sustain true security.
Mandatory Skill Sets/Expertise
Key Attributes
Key Responsibilities
Role Summary:
As an IT Engineer, you will play a pivotal role in providing technical support to our internal members and ensuring the smooth operation of our IT environment. You will work under the guidance of IT Manager to resolve technical issues, help end-users, and contribute to the overall success of our IT support team
Mandatory Skill Sets/Expertise
Key Responsibilities
Role Summary
As a developer, you will be responsible for designing, coding, testing, modifying and implementing new features in the B2B SaaS product. You would closely work with the technical architect towards building a scalable GRC tool.
Mandatory Skill Sets/Expertise
Key Attributes
Key Responsibilities
Role Summary
As a Content Strategist & Editor, you would be responsible for strategizing and creating high quality, engaging and informative content including blog spots, articles, product/service descriptions and other forms of digital and print media. You would be responsible for enhancing the brand awareness of Accorian whereby contributing towards lead generation from prospective customers.
Mandatory Skill Sets/Expertise
Key Responsibilities
Drop your CVs to joinourteam@accorian.com
Interested Position