IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

Live Panel Discussion!Panel: Why EMV is Not the Only Answer to Payment Security

When:   September 16 | 2014     Attend

2013 was the worst year yet in terms of data breaches, with over 740 million records exposed, and 2014 is shaping up to be more of the same. Security analysts estimate the costs of the data breach that hit U.S. retailer Target are approaching half a billion dollars for the company. The total cost of the breach including losses incurred by banks, consumers and others–could easily reach into the billions of dollars, and the incidents continue in the food industry, state government, and other sectors.

Read more...
 
E-mail

Live WebcastEMV & Payment Security: Evolving Beyond the Mag Stripe

Recorded:   July 15 | 2014     Play

Everything changed six months ago. The Target data breach caused us all to rethink payment security. The U.S. transition to EMV chip and pin cards, is around the corner. Tune into this webinar for a complete update on where EMV is today – lessons learned from Europe and Canada's experience of EMV adoption, and the latest about the liability shift in the U.S. How and when will EMV be augmented by new approaches to card data in mobile wallets, online, and at the point of sale?

Read more...
 
E-mail

PCI DSS 3.0PCI DSS 3.0 - What the Changes Mean for Your Organization 

Recorded:   January 21 | 2014      Play

The official release of PCI DSS v3.0 is here, now what? Voltage Security have invited a PCI DSS QSA to assist you with your PCI challenges by providing recommendations on how to execute a seamless upgrade from PCI DSS version 2.0 to 3.0. Find out why it's no longer acceptable to strive for compliance over real-time security. And learn how the new standard brings a whole new meaning to 'business as usual'.

Read more...
 
E-mail

Navigating PCI Security Mountains in the Cloud Panel Discussion: Navigating PCI Security Mountains in the Cloud 

Recorded:   November 6 | 2013      View

Organizations outsourcing card data to the cloud face significant security risks. Storing, processing and transmitting cardholder data in the cloud brings the cloud environment into scope for the PCI Data Security Standard (PCI DSS). And as soon as an organization adds other players to the offsite card-management mix, ensuring compliance with the PCI DSS becomes increasingly challenging.

Read more...
 
E-mail

Navigating PCI Security Mountains in the CloudNavigating PCI Security Mountains in the Cloud 

Recorded:   May 15 | 2013     Play

Organizations outsourcing card data to the cloud face significant security risks. As soon as an organization adds other players to the offsite card-management mix, ensuring compliance with the PCI Data Security Standard becomes increasingly challenging. Cloud users and cloud service providers need to understand what their roles and responsibilities are when it comes to protecting this data. Storing, processing and transmitting cardholder data in the cloud brings the cloud environment into scope for PCI-DSS. 

Read more...
 
E-mail

Intel3 Core Tokenization Models - Choosing the Right PCI DSS Strategy

Recorded:    View Now!

When securing credit card data, the imperative to be PCI DSS compliant remains a constant, while the actual solution implemented by merchants can vary depending on the size and nature of an organization.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  Next 
  •  End 
  • »
Page 1 of 7

Subscribe via Email

 Your Email:
Banner
Banner
Banner