SlideShare a Scribd company logo
The Need for PCI TotalFBO User Conference Presented by Branden R. Williams [email_address] http://brandenwilliams.com/ September 17, 2009
PCI Data Security Standard Overview 2001-3 Payment application best practices Program announced 2005 2004 Programs combined into Payment Card Industry (PCI) Data Security Standards (DSS) 12 core requirements  Scanning requirements for public-facing systems PCI security standards Council formed and PCI DSS version 1.1 released 2006 PA-DSS released New SAQs released PCI version 1.2 2008 Separate Visa (2001) and MasterCard (2003) programs The History of PCI DSS
Defining Compliance/Validation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why breaches happen: Firefighting and PCI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Fire Inspector Analogy
Case Studies: A company gets it oh so wrong ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Medium US-Based Retail, <1,000 Locations
Case Studies: A company gets it Large US-Based Service Provider ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Studies: A company gets it right Medium US-Based Service Provider ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What keeps you up at night? As an executive, Data Security SHOULD keep you up at night! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Branden R. Williams reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes.  Unpublished work of Branden R. Williams. Ā© All rights reserved. This work is an unpublished work and contains confidential, proprietary and trade secret information of Branden R. Williams. Access to this work is restricted to Branden R. Williams and any employee who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected or adapted  without the prior written consent of Branden R. Williams.

More Related Content

What's hot

Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
JoAnna Cheshire
Ā 
Identity Federation for the Enterprise: Lessons Learned
Identity Federation for the Enterprise: Lessons LearnedIdentity Federation for the Enterprise: Lessons Learned
Identity Federation for the Enterprise: Lessons Learned
Nalneesh Gaur
Ā 
ACFE 2017: Audit and Fraud Joining Forces
ACFE 2017: Audit and Fraud Joining Forces ACFE 2017: Audit and Fraud Joining Forces
ACFE 2017: Audit and Fraud Joining Forces
Jen Dunham, CFE
Ā 
Effective Security Metrics
Effective Security MetricsEffective Security Metrics
Effective Security Metrics
InnoTech
Ā 
A Hands-On Demonstration for Connecting Products into the Salesforce Platform
A Hands-On Demonstration for Connecting Products into the Salesforce PlatformA Hands-On Demonstration for Connecting Products into the Salesforce Platform
A Hands-On Demonstration for Connecting Products into the Salesforce Platform
Salesforce Developers
Ā 
Third party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceThird party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligence
Charles Steve
Ā 
Re-shaping Assurance
Re-shaping AssuranceRe-shaping Assurance
Re-shaping Assurance
Paul Wenman
Ā 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC Advisory Group
Ā 
Crisis Management Techniques for Cyber Attacks
Crisis Management Techniques for Cyber AttacksCrisis Management Techniques for Cyber Attacks
Crisis Management Techniques for Cyber Attacks
PECB
Ā 
VmTurbo
VmTurboVmTurbo
VmTurbo
Dealmaker Media
Ā 
Octopus Service Level Agreements
Octopus Service Level AgreementsOctopus Service Level Agreements
Octopus Service Level Agreements
vincent.biot
Ā 
Automated Regulatory Compliance Management
Automated Regulatory Compliance ManagementAutomated Regulatory Compliance Management
Automated Regulatory Compliance Management
Adeel159
Ā 

What's hot (12)

Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
Ā 
Identity Federation for the Enterprise: Lessons Learned
Identity Federation for the Enterprise: Lessons LearnedIdentity Federation for the Enterprise: Lessons Learned
Identity Federation for the Enterprise: Lessons Learned
Ā 
ACFE 2017: Audit and Fraud Joining Forces
ACFE 2017: Audit and Fraud Joining Forces ACFE 2017: Audit and Fraud Joining Forces
ACFE 2017: Audit and Fraud Joining Forces
Ā 
Effective Security Metrics
Effective Security MetricsEffective Security Metrics
Effective Security Metrics
Ā 
A Hands-On Demonstration for Connecting Products into the Salesforce Platform
A Hands-On Demonstration for Connecting Products into the Salesforce PlatformA Hands-On Demonstration for Connecting Products into the Salesforce Platform
A Hands-On Demonstration for Connecting Products into the Salesforce Platform
Ā 
Third party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceThird party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligence
Ā 
Re-shaping Assurance
Re-shaping AssuranceRe-shaping Assurance
Re-shaping Assurance
Ā 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
Ā 
Crisis Management Techniques for Cyber Attacks
Crisis Management Techniques for Cyber AttacksCrisis Management Techniques for Cyber Attacks
Crisis Management Techniques for Cyber Attacks
Ā 
VmTurbo
VmTurboVmTurbo
VmTurbo
Ā 
Octopus Service Level Agreements
Octopus Service Level AgreementsOctopus Service Level Agreements
Octopus Service Level Agreements
Ā 
Automated Regulatory Compliance Management
Automated Regulatory Compliance ManagementAutomated Regulatory Compliance Management
Automated Regulatory Compliance Management
Ā 

Similar to Total FBO User Conference

NWA ISSA Meeting
NWA ISSA MeetingNWA ISSA Meeting
NWA ISSA Meeting
Branden Williams
Ā 
Supply Chain and Third-Party Risks During COVID-19
Supply Chain and Third-Party Risks During COVID-19Supply Chain and Third-Party Risks During COVID-19
Supply Chain and Third-Party Risks During COVID-19
Sophia Price
Ā 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013
InvestorSymantec
Ā 
Risk%20Management_Compliance%20FINAL
Risk%20Management_Compliance%20FINALRisk%20Management_Compliance%20FINAL
Risk%20Management_Compliance%20FINAL
Mary Wasylenko
Ā 
Digital Transformation for Insurance and Underwriting Processes - Caroly Mart...
Digital Transformation for Insurance and Underwriting Processes - Caroly Mart...Digital Transformation for Insurance and Underwriting Processes - Caroly Mart...
Digital Transformation for Insurance and Underwriting Processes - Caroly Mart...
SigortaTatbikatcilariDernegi
Ā 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
Stacy Willis
Ā 
EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...
EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...
EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...
Rea & Associates
Ā 
Leveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on securityLeveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on security
Mike Lemire
Ā 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
Stacy Willis
Ā 
Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14
InvestorSymantec
Ā 
Continuous KYC from Accenture + Quantexa
Continuous KYC from Accenture + QuantexaContinuous KYC from Accenture + Quantexa
Continuous KYC from Accenture + Quantexa
accenture
Ā 
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
Executive Leaders Network
Ā 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archer
Subhajit Bhuiya
Ā 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy
Maarten BOONEN
Ā 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
Jim Kaplan CIA CFE
Ā 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASIS
Dermot Clarke
Ā 
Evolution Pci For Pod1
Evolution Pci For Pod1Evolution Pci For Pod1
Evolution Pci For Pod1
Amanda Squires@Pod1
Ā 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
ControlCase
Ā 
Software Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival BenefitsSoftware Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival Benefits
Eric Chiu
Ā 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
Kevin Duffey
Ā 

Similar to Total FBO User Conference (20)

NWA ISSA Meeting
NWA ISSA MeetingNWA ISSA Meeting
NWA ISSA Meeting
Ā 
Supply Chain and Third-Party Risks During COVID-19
Supply Chain and Third-Party Risks During COVID-19Supply Chain and Third-Party Risks During COVID-19
Supply Chain and Third-Party Risks During COVID-19
Ā 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013
Ā 
Risk%20Management_Compliance%20FINAL
Risk%20Management_Compliance%20FINALRisk%20Management_Compliance%20FINAL
Risk%20Management_Compliance%20FINAL
Ā 
Digital Transformation for Insurance and Underwriting Processes - Caroly Mart...
Digital Transformation for Insurance and Underwriting Processes - Caroly Mart...Digital Transformation for Insurance and Underwriting Processes - Caroly Mart...
Digital Transformation for Insurance and Underwriting Processes - Caroly Mart...
Ā 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
Ā 
EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...
EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...
EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...
Ā 
Leveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on securityLeveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on security
Ā 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
Ā 
Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14
Ā 
Continuous KYC from Accenture + Quantexa
Continuous KYC from Accenture + QuantexaContinuous KYC from Accenture + Quantexa
Continuous KYC from Accenture + Quantexa
Ā 
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
Ā 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archer
Ā 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy
Ā 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
Ā 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASIS
Ā 
Evolution Pci For Pod1
Evolution Pci For Pod1Evolution Pci For Pod1
Evolution Pci For Pod1
Ā 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
Ā 
Software Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival BenefitsSoftware Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival Benefits
Ā 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
Ā 

Recently uploaded

QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
Ā 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
Ā 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
Ā 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
Ā 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
Ā 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
Ā 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
Ā 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
Ā 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo GĆ³mez Abajo
Ā 
Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
manji sharman06
Ā 
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
Ā 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
Ā 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
Ā 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
Ā 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
Ā 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
Ā 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
Ā 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
Ā 
What is an RPA CoE? Session 2 ā€“ CoE Roles
What is an RPA CoE?  Session 2 ā€“ CoE RolesWhat is an RPA CoE?  Session 2 ā€“ CoE Roles
What is an RPA CoE? Session 2 ā€“ CoE Roles
DianaGray10
Ā 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
Ā 

Recently uploaded (20)

QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
Ā 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Ā 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
Ā 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Ā 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Ā 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ā 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Ā 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
Ā 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Ā 
Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
Ā 
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Ā 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Ā 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Ā 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
Ā 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ā 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Ā 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
Ā 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
Ā 
What is an RPA CoE? Session 2 ā€“ CoE Roles
What is an RPA CoE?  Session 2 ā€“ CoE RolesWhat is an RPA CoE?  Session 2 ā€“ CoE Roles
What is an RPA CoE? Session 2 ā€“ CoE Roles
Ā 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Ā 

Total FBO User Conference

  • 1. The Need for PCI TotalFBO User Conference Presented by Branden R. Williams [email_address] http://brandenwilliams.com/ September 17, 2009
  • 2. PCI Data Security Standard Overview 2001-3 Payment application best practices Program announced 2005 2004 Programs combined into Payment Card Industry (PCI) Data Security Standards (DSS) 12 core requirements Scanning requirements for public-facing systems PCI security standards Council formed and PCI DSS version 1.1 released 2006 PA-DSS released New SAQs released PCI version 1.2 2008 Separate Visa (2001) and MasterCard (2003) programs The History of PCI DSS
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Branden R. Williams reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Unpublished work of Branden R. Williams. Ā© All rights reserved. This work is an unpublished work and contains confidential, proprietary and trade secret information of Branden R. Williams. Access to this work is restricted to Branden R. Williams and any employee who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected or adapted without the prior written consent of Branden R. Williams.

Editor's Notes

  1. 11/04/09
  2. PCI has been a long time in the making. The current standards are largely based on independent efforts made by Visa USA and MasterCard International. At the beginning of the century, credit card fraud was increasing at an astronomical rate. In order to combat the large losses suffered by member banks, Visa created the Cardholder Information Security Program (CISP). This program aimed to address weaknesses found in the structure of the payment card industry and implementations of large merchant systems. Two years later, MasterCard announced the Site Data Protection program (SDP) with a list of standards largely aimed at electronic commerce merchants. In December of 2004, Visa and MasterCard joined forces and released the Payment Card Industry Data Security Standard (PCI-DSS). This unified approach solved many problems related to two independent standards trying to address the same root problem. The PCI-DSS is made of 12 core requirements (sometimes called the 12 Pillars or Digital Dozen) and ongoing maintenance programs to ensure compliance is maintained on a day to day basis. In response to a large number of payment application compromises (largely Point of Sale and Shopping Cart based), Visa USA created the Payment Applications Best Practices program in 2005. The intent of this program was to combat large scale breaches based on poorly written payment application programs. This program has gained adoption and now more than 80 applications are certified. PABP has been superseded by the Payment Application Data Security Standard and is managed by the PCI Security Standards Council. On September 7, 2006, the PCI Security Standards Council was officially announced in conjunction with version 1.1 of the PCI Standard. During 2008, weā€™ve seen a new revision of the PCI-DSS, updated self assessment questionnaires (which are consequently now out of date with version 1.2 of the standard), and the release of the PA-DSS.
  3. 11/04/09