Threat Landscape
Payments and fintech operate at the floor of cybersecurity compliance, with the floor sitting structurally below the threat.
The Payment Card Industry Data Security Standard (PCI DSS) is the dominant compliance regime for payment-card data globally. It is not a law; it is a contractual obligation imposed by card networks (Visa, Mastercard, American Express, Discover, JCB) on acquiring banks, which pass the obligation to merchants and processors. PCI DSS Version 4.0.1 came into mandatory effect in March 2024.
The Verizon Payment Security Report's most-cited finding is that, in over a decade of forensic investigation following confirmed payment-card breaches, no breached organisation has been found fully PCI DSS compliant at the moment of breach. The corollary finding is that the specific control failures identified post-breach are precisely the controls PCI DSS Section requirements address: Section 3 (data storage), Section 4 (transmission encryption), Section 6 (secure development), Section 8 (access control), Section 11 (vulnerability scanning). The standard exists. The control implementation is the gap. [01]
PCI DSS specifies the controls a payments organisation must implement to protect cardholder data. It does not specify what protection looks like in an architecture in which the cardholder data is not stored as cardholder data.
The 2024 Ticketmaster breach is the canonical illustration of how the architecture itself is the problem. The breach occurred via Snowflake, a third-party cloud-data provider, and exposed approximately 560 million customer records including payment card data. The PCI DSS scope of the affected merchant was reduced — but the breach impact was not, because the data still existed in a form recoverable by an adversary with sufficient access. [02]