Building a Comprehensive Program For PCI Compliance
Rusty Estes, CISSP, Ahold
- Introduction (00:00:00)
- Chapter Title (00:00:08)
- Agenda (00:00:23)
- PCI Data Security Standard (00:00:44)
- Chapter Title (00:01:08)
- Which Devices Are In-Scope? (00:01:25)
- Chapter Title (00:01:52)
- Cardholder Data/Sensitive Authentication Data (00:02:24)
- The Key Players (00:02:46)
- Chapter Title (00:03:07)
- PCI DSS Requirement (00:03:09)
- External Vulnerability Scan Requirements (00:03:36)
- Chapter Title (00:04:12)
- Chapter Title (00:04:35)
- Ahold - External Vulnerability Scans (00:05:02)
- Chapter Title (00:05:59)
- Chapter Title (00:06:20)
- Chapter Title (00:06:30)
- Chapter Title (00:06:35)
- Chapter Title (00:06:38)
- Chapter Title (00:06:48)
- Chapter Title (00:07:12)
- Chapter Title (00:07:17)
- Chapter Title (00:07:19)
- Ahold Devices (00:08:13)
- Aholds Challenges (00:08:34)
- Ahold - Internal Vulnerability Scans (00:09:08)
- Chapter Title (00:09:32)
- Chapter Title (00:09:57)
- Chapter Title (00:11:01)
- Keys to Successful PCI DSS Compliance Program (00:12:02)
- PCI DSS 24-Month Life Cycle (00:16:19)
- Chapter Title (00:16:35)
- Chapter Title (00:16:58)
- Merchant QSA Training (00:17:17)
- Resources (00:17:36)