IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

PCI 3.0 and VISA in 2015

Live Webcast!             Join our expert roundtable as we give some tips to prepare for PCI DSS 3.0 and…

Click on the slide!

Securing Payments in 2015

Live Webcast!             Join us as we explain how to implement EMV, End-to-end encryption (E2EE), and Tokenization.

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks

Latest News

1 Rise of enterprise technologies means CIOs must take the lead to align business and IT, argues new EIU e-book
2 Visa and MasterCard report strong bank uptake for HCE-based mobile payments
3 Target takes $162m hit on data breach expenses
4 New York state watchdog sets sights on bank money laundering systems
5 74% wish to embrace machine-to-machine technology but admit barriers to adoption, reveals Advanced survey
6 Visa brings tokenisation to Europe; preps P2P/social media payments service
7 Russian national charged in largest known data breach extradited to the US
8 Canadian consumers rank payment security above all else - Visa Canada study
9 Bank chiefs frightened by cyber risks - PwC
10 Only a quarter of financial decision makers completely trust their data, BlackLine survey finds
11 Hackers nab $1 billion in global cyber heist
12 Obama to push cybersecurity threat sharing
13 Visa ramps up tokenisation effort
14 More than half of US POS terminals to be EMV-capable by end of 2015 - Aite report
15 More than one billion records compromised by data breaches in 2014
16 Identity Management to Reach Tipping Point in 2015
17 Cybersecurity Concerns Rise as a Risk Factor for Board Members and Senior Executives in 2015
18 Authorised Access: the ‘Trojan Horse’ of Cyber Security
19 IT priorities and regulatory environment have asset managers focused on risk management and efficiencies
20 UK’s tech businesses set to grow four times faster than GDP in 2015 - Barclays
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »
Page 1 of 31

 

.

Featured Webcasts


EMV & Payment Security: Evolving Beyond the Mag Stripe EMV & Payment Security: Evolving Beyond the Mag Stripe EMV & Payment Security: Evolving Beyond the Mag Stripe Recorded:   July 15 | 2014   &...
 
Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Recorded:   Augus...
 
Panel Discussion: Why EMV is Not the Only Answer to Payment Security Panel Discussion: Why EMV is Not the Only Answer to Payment Security Panel: Why EMV is Not the Only Answer to Payment Security Recorded:   September 16 | 2014 &nbs...
 
Top Security Guidelines for EMV and Mobile Payments in 2015 Top Security Guidelines for EMV and Mobile Payments in 2015 Top Security Guidelines for EMV and Mobile Payments in 2015 Recorded:   December 4 | 2014 &nbs...
 

More. . .