Getting PCI compliance and IT security right

Share this article:
Getting PCI compliance and IT security right
Getting PCI compliance and IT security right

Getting PCI compliance and IT security right

Date: Tuesday, December 7, 2010
Time: 2:00 p.m. ET/11:00 a.m. PT

CLICK HERE to register for free

The Payment Card Industry's Data Security Standard (DSS) is known as one of the most prescriptive industry regulations in the marketplace. Yet, even with all the details provided on ways to keep critical corporate assets secure, while, at the same time, get compliant with DSS, it still proves confounding to many executive leaders. Questions around the proper technologies to implement, the best strategies to focus on or the right security measures for newer IT technologies now being adopted by many organizations still abound.

In this webcast, we hear from a leading expert about some of the tactical and strategic steps one can consider with attempting to get PCI compliant and also keep critical data safe from cyber attacks.

Featured speakers
Ward Spangenberg, director of security operations, Zynga
Fabian Oliva, global PCI competency leader, IBM
Ilena Armstrong, editor-in-chief, SC Magazine

Sponsored by

Share this article:

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Make It Stop! Protecting Corporate Data Assets Against Breach

SCMagazine's 2014 Data Breach Survey shows companies are taking steps to raise security awareness and investing in IT security and risk management practices but given the number of breaches and other high profile cyber crimes that have occurred more recently, are they doing enough?

Compliance gets you on the road to security

Today there is a veritable alphabet soup of data security standards and laws governing how companies must operate. But, most agree, compliance is more of a first step to security rather than an assurance of security itself.

Battling savvy cyber thieves

The methods cyber attackers use to infiltrate networks are endless. There is no doubt that the more sophisticated bad guys looking to steal specific data have enlisted surreptitious ways to achieve their ends.