The recent batch of compromised mega retailers, including Target, Neiman Marcus and Michaels, reveals just how vulnerable payment systems are.
Sophisticated tools, strong security policies, and updated regulatory requirements haven’t been able to prevent hackers from taking advantage of inherent vulnerabilities in payment systems.
To help us understand how this happens, payment systems expert Slava Gomzin, author of Hacking Point of Sale, joins us for this upcoming webcast.
Slava will illustrate how retailers such as Target were compromised, what went wrong, failures in PCI to address all vulnerabilities and how these types of breaches can be prevented in the future.
Attendees will receive a sample chapter of Slava’s book on “Payment Application Architecture,” which provides a detailed overview of how payment systems work, protocols and their weaknesses. Qualified attendees will also earn one CPE credit for their participation.
- Date: July 15, 2014
- Time: 11:00 AM Pacific – 2:00 PM Eastern
- Duration: One Hour
Register today to join us for this informative webcast.
Dozens of previously aired webcasts covering topics like Security Configuration Management, Compliance Automation and Achieving Continuous Monitoring are available for viewing HERE
Check out Tripwire SecureScan™, a free, cloud-based vulnerability management service for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the Heartbleed vulnerability.
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
Title image courtesy of ShutterStock