Skip to content ↓ | Skip to navigation ↓

picThe recent batch of compromised mega retailers, including Target, Neiman Marcus and Michaels, reveals just how vulnerable payment systems are.

Sophisticated tools, strong security policies, and updated regulatory requirements haven’t been able to prevent hackers from taking advantage of inherent vulnerabilities in payment systems.

To help us understand how this happens, payment systems expert Slava Gomzin, author of Hacking Point of Sale, joins us for this upcoming webcast.

Slava will illustrate how retailers such as Target were compromised, what went wrong, failures in PCI to address all vulnerabilities and how these types of breaches can be prevented in the future.

Attendees will receive a sample chapter of Slava’s book on “Payment Application Architecture,” which provides a detailed overview of how payment systems work, protocols and their weaknesses. Qualified attendees will also earn one CPE credit for their participation.

Webinar Details:

  • Date: July 15, 2014
  • Time: 11:00 AM Pacific – 2:00 PM Eastern
  • Duration: One Hour

learn more and register

Register today to join us for this informative webcast.


Dozens of previously aired webcasts covering topics like Security Configuration Management, Compliance Automation and Achieving Continuous Monitoring are available for viewing HERE



picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].


Title image courtesy of ShutterStock